当前位置:网站首页>Understanding symmetric key | asymmetric key | shared key | public private key on Cryptography

Understanding symmetric key | asymmetric key | shared key | public private key on Cryptography

2020-12-07 16:01:44 Quant_ Learner

  • Overview

    cryptography

  • cryptographic keys

    In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm.

    For encryption algorithms, a key specifies the transformation of plaintext into ciphertext, and vice versa depending on the decryption algorithm.

  • Symmetric-key algorithms

    Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.

  • Public-key cryptography

    Public-key cryptography (or asymmetric cryptography) is a cryptographic system that uses pairs of keys:

    • public keys, which may be disseminated widely
    • private keys, which are known only to the owner

    The generation of such keys depends on cryptographic algorithms based on mathematical problems to produce one-way function.

    Effective security only requires keeping the private key private; the public key can be openly distributed without compromising security.

  • Shared key encryption

    Shared key and Public key encryption

    shared secret

    Shared key encryption uses one key to encrypt and decrypt messages.

    In cryptography, a shared secret is a piece of data, known only to the parties involved,in a secure communication. This usually refers to the key of a symmetric cryptosystem.

  • References

  1. Encryption and Decryption

版权声明
本文为[Quant_ Learner]所创,转载请带上原文链接,感谢
https://chowdera.com/2020/12/20201207154739404v.html