--- title: 'Symmetric & Asymmetric - which, why and when?' disqus: hackmd --- # Why Prove that actor Alice respond to and transmit the bytes requested. Another actor Bob can trustlessly validate that the encryption of Alice holds. **Don't trust verify.** With content addressability we have some notion of data we want. On the contrary, we don't know the data being send back. This property can be used in a multitude of ways, including safely transmitting data over the wire. Another # Symmetric In this encryption scheme, the same key is used to encrypt and decrypt messages. ## Algorithms ### AES - AES uses different key sizes, as the key size increases so does security. ### ChaCha20 - # Asymmetric In this encryption scheme, there are two keys, a public and private. Public to encrypt the data and private to decrypt. ## Algorithms ### RSA (Rivest, Shamir, Adleman) - Four steps: - Key generation - Key distribution - Encryption - Decryption ### ElGamal - # Zero Knowledge Proofs - # References - https://www.notamonadtutorial.com/math-survival-kit-for-developers/ - https://www.notamonadtutorial.com/symmetric-encryption/ - https://www.notamonadtutorial.com/how-to-create-your-own-crappy-rsa-as-a-software-developer/ -