Eden Kandinsky Security

Loading

Symmetric Cryptography, Data Encryption

Symmetric Cryptography, Data Encryption

Symmetric Cryptography, Data Encryption
The Symmetric Challenge: Key Distribution.
  • Asymmetric Cryptography (e.g., RSA or ECC) is used to securely exchange the smaller, high-speed symmetric key.
  • Symmetric Cryptography (e.g., AES) then takes over, using the securely exchanged key to encrypt the large volume of session data.

Translate »