6. Advantage Less computation power consuming Disadvantage Key is transported over the network which make it venerable towards eavesdropping Example AES, IDEA
7. Advantage Decrypting Key need not to be transported over the network Disadvantage computation power consuming Example RSA, Diffie‐Hellman