weave in asymmetric cryptography formerly in ch3 as symm-key explainer

This commit is contained in:
Tammi L. Coles 2023-10-12 16:49:51 +02:00 committed by Heiko Schaefer
parent 2a828cd0fd
commit ce6d28020c
No known key found for this signature in database
GPG key ID: 4A849A1904CCBD7D

View file

@ -19,7 +19,7 @@ Here are two important properties of cryptographic hash functions:
## Symmetric-key cryptography
[Symmetric-key cryptography](https://en.wikipedia.org/wiki/Symmetric-key_algorithm) uses the same cryptographic key for both encryption and decryption. Symmetric-key cryptographic systems support *encryption/decryption* operations.
[Symmetric-key cryptography](https://en.wikipedia.org/wiki/Symmetric-key_algorithm) uses the same cryptographic key for both encryption and decryption, unlike asymmetric cryptography where a pair of keys is used: a public key for encryption and a corresponding private key for decryption. Symmetric-key cryptographic systems support *encryption/decryption* operations.
Participants in symmetric-key operations need to exchange the shared secret over a secure channel.