Symmetric vs Asymmetric encryption: What’s the difference?

Estimated reading time: 7 minutes
In this blog post, we explain the main differences between symmetric vs asymmetric encryption. This article will also explain which encryption method you should use.

Some words about different encryption methods
In today’s world, scammers and other cyber-criminals are becoming more and more present affecting millions of users. To prevent these individuals from stealing our data we have to encrypt everything. Luckily, there are three different encryption methods that you can use: Symmetric encryption, Asymmetric encryption, and Hash functions (Keyless).
Right now, we’ll focus on symmetric encryption vs asymmetric encryption and leave the third (hash functions) for a later time.
Mailfence uses Symmetric and Asymmetric encryption as each method has its pros and cons. You will learn more about that later. Both encryption methods use keys to encrypt and decrypt data. The main difference is that symmetric encryption uses the same key to encrypt and decrypt data, while asymmetric encryption uses a pair of keys – public key to encrypt data and a private key to decrypt information.
Symmetric Encryption | Asymmetric Encryption |
Uses a single key to encrypt and decrypt data | Uses a public key to encrypt data and a private key to decrypt data |
Faster encryption process | Slower encryption process |
Keys are 128 or 256-bit long | Keys are 2048-bit or longer |
Doesn’t use a lot of resources | Uses more resources |
Cipher text is smaller or the same size as the original plain text | Cipher text is larger or the same size as the original cipher text |
Provides confidentiality | Provides confidentiality, non-repudiation and authenticity |
Uses AES, DES, 3DES, IDEA, RC4, RC5, RC6 and Blowfish algorithms | Uses Diffie-Hellman, RSA, ECC, DSA and El Gamal algorithms |
Better at handling and transferring large amounts of data | Better at handling and transferring smaller amounts of data |
Has the risk of someone stealing the key if it is not managed properly | Has the risk of losing the key (the key is irrevocable) |
What is symmetric encryption?
Symmetric encryption aka symmetric key cryptography uses one single key to encrypt and decrypt data. You have to share this key with the recipient. Let’s say you want to say I love you Mom, you would write your email, then set a secret key to encrypt it. When mom receives the message she would enter the secret key to decrypt the email.

Pros and cons of symmetric encryption
Let’s take a look at some of the pros and cons of symmetric encryption:
Pros:
- Easier to implement and use
- Faster than asymmetric encryption
- Less resource-intensive
- Good for handling and transferring larger amounts of data
Cons:
- Less secure than asymmetric encryption
- Loos of a key will mean that data encrypted with it is compromised
- Key has to be shared securely with the other party
How does Mailfence incorporate symmetric key cryptography?
Mailfence offers password-encrypted messages (PEM) based on symmetric encryption. Our solution allows you to set a password hint that helps the recipient decrypt the message. You can share your key via an SMS, a phone call or during a physical meeting.
Also with Mailfence’s PEM, you can set an expiration date for the email. After the expiration date, the email cannot be decrypted anymore. Furthermore, we store password-encrypted messages in a zero-knowledge environment and encrypt them with your password. That way only you and the intended recipient have access to the message.
In case you would like to know more visit our dedicated knowledge base.
Here are some good practices to follow for our PEM:
- Never use your OpenPGP passphrase
- Never use your Mailfence account password
- If you are sending an important message make sure unwanted readers cannot guess your password.
There are many symmetric encryption algorithms for instance: DES, 3DES, AES, IDEA, RC4, RC5,… For your info, Mailfence uses AES in combination with other ciphers.
What is Asymmetric encryption?
As stated, earlier public-key encryption requires two keys to work. Firstly, a public key must be made public to encrypt the data. Also, a private key is used to decrypt the data. It sounds complicated enough. Let me break it down.

The public key and the private key are not the same thing but they are related. Moreover, you create your message then encrypt it with the recipient’s public key. After that, if the recipient wants to decrypt your message he/she would have to do it with his/her private key. Keep the (private) key private at all times, the best practice would be to store it locally. One requires greater knowledge than the average person to make this happen.
The emailing software of the recipient will see if the private key corresponds with the public key and then it will prompt the user to type the passphrase to decrypt the message.
Some best practices for asymmetric encryption:
- Use 2048-bit and longer keys
- Store your private key locally so you don’t forget it
- Don’t share your private key with anyone
Creating strong keys is the foundation of Asymmetric encryption. A good encryption practice would be to use multiple encryption methods instead of just one. Not everyone knows how to use public-key encryption so there may be occasions you have to use different encryption methods.
Mailfence uses Asymmetric encryption based on the RSA-algorithm for OpenPGP-based keys. ECC (Curve 25519) algorithm for OpenPGP-based keys is also supported.
Pros and cons of Asymmetric encryption
Asymmetric encryption also has its advantages and disadvantages. Let’s take a look at what they are:
Pros:
- It’s more secure than symmetric encryption
- Data can only be decrypted using the private key held by the owner
- If the public key is lost or stolen, data won’t be compromised
- Provides authentication and non-repudiation in addition to confidentiality
Cons:
- It’s slower than symmetric encryption
- Uses more resources
- If the private key is lost, there is no way to retrieve it
Thoughts on Symmetric vs Asymmetric encryption
Which encryption should you use? Use Symmetric encryption when you would like to send a quick encrypted message. Use Asymmetric encryption when you have the verified OpenPGP public key of your recipient. Combine public-key encryption with digital signatures if you don’t want to take any chances. Don’t know how to send encrypted emails? Find out more in our blog post.
Symmetric vs Asymmetric encryption was a very interesting article for us to write. We hope, we have clarified the concept of Symmetric vs Asymmetric encryption. Stay tuned because Mailfence is planning to release more of these educational articles soon.
FAQ section
Symmetric encryption uses a private key to encrypt and decrypt an encrypted email.
Asymmetric encryption uses the public key of the recipient to encrypt the message. Then if the recipient wants to decrypt the message the recipient will have to use his/her private key to decrypt. If the keys correspond then the message is decrypted.
In our opinion, one encryption method is not better than the other. It’s just a different way of encrypting. The user has to be mindful if he/she follows best security practices at all times.
The biggest disadvantage is that you have to share the secret key somehow. There are many ways to share it however if an attacker finds out what the secret key is. Then emails that were encrypted with that secret key are compromised.
Follow us on twitter/reddit and keep yourself posted at all times.
– Mailfence Team
Arnaud is the co-founder and CEO of Mailfence. He’s been a serial entrepreneur and startup investor since 1994 and launched several pioneering internet companies such as Rendez-vous, IP Netvertising or NetMonitor. He is regarded as the internet advertising pioneer of Belgium. You can follow Arnaud on this blog.