Types of Asymmetric Systems
As described earlier in the chapter, using purely symmetric key cryptography has three drawbacks, which affect the following:
Security services Purely symmetric key cryptography provides confidentiality only, not authentication or nonrepudiation.
Scalability As the number of people who need to communicate increases, so does the number of symmetric keys required, meaning more keys must be managed.
Secure key distribution The symmetric key must be delivered to its destination through a secure courier.
Despite these drawbacks, symmetric key cryptography was all that the computing society had available for encryption for quite some time. Symmetric and asymmetric cryptography did not arrive in this world on the same day ...