Compare and contrast these two main types of encryption, including their use cases, strengths, and weaknesses.