Symmetrical vs asymmetrical Encryption Pros and Cons by Example