1
00:00:00,040 --> 00:00:05,250
so one of the most important differences in encryption is symmetric versus asymmetric encryption.

2
00:00:05,250 --> 00:00:10,970
and it's really important to understand what that means and the implications of both and what they are supposed to do.

3
00:00:10,970 --> 00:00:17,990
so at the highest level, symmetric encryption versus asymmetric is really a difference of the amount of keys used in asymmetric encryption.

4
00:00:17,990 --> 00:00:24,010
you have two different keys, a public key, which can be shared out to anyone and a private key, which should be kept secret.

5
00:00:24,010 --> 00:00:25,600
it actually has to be kept secret.

6
00:00:25,660 --> 00:00:28,720
because if someone has your private key, well, they can decrypt anything.

7
00:00:28,740 --> 00:00:38,430
asymmetric encryption is more secure, but it's more, it's more expensive in terms of time and the cost computationally to actually compute and decrypt things.

8
00:00:38,430 --> 00:00:44,770
that's because you're using two different separate keys and it costs a little bit more time on a computer to actually decrypt it.

9
00:00:44,770 --> 00:00:47,630
symmetric encryption on the other hand, only involves one key.

10
00:00:47,630 --> 00:00:51,510
this key is shared amongst all the parties that need to encrypt and decrypt data.

11
00:00:51,510 --> 00:01:04,320
it's very fast and less expensive on the computer and in terms of time, but it's a little less secure because if that single key does get compromised, well, then you, then all of the encrypted data becomes compromised as well.

12
00:01:05,099 --> 00:01:07,930
so you have to be very careful how you're sharing that one key.

13
00:01:07,930 --> 00:01:14,680
and especially over the internet today, if you're trying to share a single key, it's very risky to share it if it's not encrypted itself.

14
00:01:14,780 --> 00:01:18,190
so it can get a bit confusing on well, how do modern systems do it?

15
00:01:18,190 --> 00:01:19,640
well, they use a mix of both.

16
00:01:19,660 --> 00:01:23,370
so almost no encryption standard is going to use just one or the other.

17
00:01:23,370 --> 00:01:33,160
if you look at something like tls, which the internet uses for normal web browsing, it actually uses both asymmetric for the key exchange and then symmetric encryption to use that key.

18
00:01:33,220 --> 00:01:43,690
so to use asymmetric to exchange a key securely, and then it will take that key and encrypt the rest of the traffic with the web session using that single key.

19
00:01:43,690 --> 00:01:50,590
so it's important just to know at a high level, the differences between the two and that both are used in almost everything when it comes to encryption.

20
00:01:50,590 --> 00:01:56,280
even later in this course, we'll talk about pgp and pgp uses both forms of encryption.

21
00:01:56,580 --> 00:01:59,210
the normal internet uses both forms of encryption.

22
00:01:59,210 --> 00:02:02,110
if you're streaming stuff over the internet, you'll use symmetric.

23
00:02:02,110 --> 00:02:06,640
if you're encrypting data at rest, just sitting on a hard drive, you'll use asymmetric, for example.

24
00:02:06,740 --> 00:02:08,870
and those are just some high level examples.

25
00:02:08,870 --> 00:02:15,090
you can get really specific on when and why to use certain types of encryption methods and especially what types of encryption.

26
00:02:15,090 --> 00:02:20,570
so some examples, if you're familiar with some encryption ciphers or encryption algorithms, here's some on the screen here.

27
00:02:20,570 --> 00:02:25,320
but like we talked about, pgp primarily uses asymmetric, although it will use symmetric in some cases.

28
00:02:25,540 --> 00:02:28,110
you have ecc, rsa, diffie- hellman.

29
00:02:28,110 --> 00:02:32,490
these are all asymmetric types of key exchanges and key encryption.

30
00:02:32,490 --> 00:02:36,280
and then you have symmetric aes two fish, des, rc four.

31
00:02:36,300 --> 00:02:38,200
if you don't know any of these, don't worry.

32
00:02:38,340 --> 00:02:40,290
all of them do slightly different things.

33
00:02:40,290 --> 00:02:43,840
they have different types of algorithms, implement key exchanges differently.

34
00:02:43,860 --> 00:02:45,430
the way they encrypt might be different.

35
00:02:45,430 --> 00:02:50,120
so it doesn't really matter, but it's good to recognize these names with the type of encryption they are.

36
00:02:50,420 --> 00:02:54,630
hopefully that gave you a good baseline understanding of symmetric versus asymmetric encryption.

37
00:02:54,630 --> 00:02:56,090
if you have any questions, let me know.

38
00:02:56,090 --> 00:02:57,560
otherwise see you in the next one.