Understanding the two fundamental approaches to encryption
Real-world systems combine both: Use asymmetric to exchange a symmetric key, then symmetric for data.
This is how TLS/HTTPS works!