Which of the following is the main difference between symmetric and asymmetric cryptographic algorithms?