The use of one private key for all decryption and encryption

Weaknesses

  • Key exchange is a major problem
  • No non-repudiation
  • The algorithm is not scalable
  • Keys must be regenerated often

The major strength is speed, unlike asymmetric encryption, which is why both are used in tandem usually