- What are the fundamental differences between symmetric key encryption and public key encryption
techniques? - Due to these differences, which kinds of security protection activities (or tasks) should be better done by
symmetric key encryption techniques and which should be better done by public key encryption
techniques?