A symmetric encryption sc heme allows the same key to be used for encrypting and decrypting messages.An asymmetric scheme requires the use of two different keys for performing the encryption and the corresponding decryption.Asymmetric key cryptographic schemes are based on mathematical foundations that provide guarantees on the intractability of reverse-engineering the encryption scheme,but they are typically much more expensive than symmetric schemes,which do
not provide any such theoretical guarantees.Asymmetric schemes are also superior to symmetric schemes since they could be used for other purposes such as authentication,confidentiality,and key distribution.
A symmetric encryption sc heme allows the same key to be used for encrypting and decrypting messages.An asymmetric scheme requires the use of two different keys for performing the encryption and the corresponding decryption.Asymmetric key cryptographic schemes are based on mathematical foundations that provide guarantees on the intractability of reverse-engineering the encryption scheme,but they are typically much more expensive than symmetric schemes,which do
not provide any such theoretical guarantees.Asymmetric schemes are also superior to symmetric schemes since they could be used for other purposes such as authentication,confidentiality,and key distribution.