Symmetric and Asymmetric Algorithms

As you build your vocabulary, the words symmetric and asymmetric are important ones to differentiate. Let’s look at the options of each and identify which of these requires the most CPU overhead and which one is used for bulk data encryption.

Symmetric

As mentioned previously, a symmetric encryption algorithm, also known as a symmetrical cipher, uses the same key to encrypt the data and decrypt the data. Two devices connected via a VPN both need the key or keys to successfully encrypt and decrypt the data that is protected using a symmetric encryption algorithm. Common examples of symmetric encryption algorithms include the following:

DES

3DES

AES

IDEA

RC2, RC4, RC5, RC6

Blowfish

Symmetrical encryption ...

Get Santos:CCNA Sec 210-260 OCG now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.