The use of one private key for all decryption and encryption
Weaknesses
- Key exchange is a major problem
- No non-repudiation
- The algorithm is not scalable
- Keys must be regenerated often
The major strength is speed, unlike asymmetric encryption, which is why both are used in tandem usually