---
title: 'Symmetric & Asymmetric - which, why and when?'
disqus: hackmd
---
# Why
Prove that actor Alice respond to and transmit the bytes requested. Another actor Bob can trustlessly validate that the encryption of Alice holds. **Don't trust verify.**
With content addressability we have some notion of data we want. On the contrary, we don't know the data being send back.
This property can be used in a multitude of ways, including safely transmitting data over the wire. Another
# Symmetric
In this encryption scheme, the same key is used to encrypt and decrypt messages.
## Algorithms
### AES
- AES uses different key sizes, as the key size increases so does security.
### ChaCha20
-
# Asymmetric
In this encryption scheme, there are two keys, a public and private. Public to encrypt the data and private to decrypt.
## Algorithms
### RSA (Rivest, Shamir, Adleman)
- Four steps:
- Key generation
- Key distribution
- Encryption
- Decryption
### ElGamal
-
# Zero Knowledge Proofs
-
# References
- https://www.notamonadtutorial.com/math-survival-kit-for-developers/
- https://www.notamonadtutorial.com/symmetric-encryption/
- https://www.notamonadtutorial.com/how-to-create-your-own-crappy-rsa-as-a-software-developer/
-