# The most important and interesting about encryption

#### A series of articles understandable even to non-specialists

##### Part 1: What is Encryption: basic concepts

##### Part 2: Symmetric encryption

##### Part 3: Symmetric encryption algorithms

##### Part 4: Asymmetric encryption

##### Part 5: Asymmetric algorithm RSA

##### Part 6: Asymmetric algorithm ECDSA

##### Part 7: The advantages and disadvantages of asymmetric algorithms and hybrid encryption

##### Part 8: One not unimportant “but”: quantum vulnerability

## Part 7: The advantages and disadvantages of asymmetric algorithms and hybrid encryption

In comparing symmetric and asymmetric algorithms, we find out each type has its advantages and disadvantages.

Thus, asymmetric encryption algorithms are more “cumbersome” when compared with symmetric ones. If the amount of data is the same, the asymmetric algorithm will take longer to process it. And the key is, respectively, longer than that of the symmetric algorithm.

Unlike symmetric algorithms, the asymmetric algorithm is a lot harder or nearly impossible to modify, since the asymmetric algorithm is based on a complex mathematical problem.

As for the advantages of asymmetric algorithms, it has the ability to exchange public keys via insecure channels. But asymmetric algorithms can be vulnerable to the so-called MITM-attack (“man in the middle”). The point of the attack is that the ”mediator” intercepts and modifies public keys, simulating the communication of the parties with each other. However, it is not enough to intercept public keys, you also need to calculate private keys. And this is quite a difficult task.

Currently, symmetric and asymmetric encryption algorithms are used together. This allows you to combine the benefits of both types of encryption.

For example, * at the first level*, Alice sends Bob a message that contains a session key of symmetric encryption. An asymmetric algorithm is used to send such a message. In this case, the communication channel is protected and the problem of exchange of the session key is solved. Furthermore, the amount of data transmitted is relatively small. This allows you to quickly transfer a symmetric encryption key.

Then, * at the second level*, Alice and Bob have the same keys in their hands, received in a safe way. Alice and Bob encrypt their messages with these keys using symmetric algorithms that have high performance and allow you to encrypt large amounts of data.