当前位置:网站首页>Encryption and decryption
Encryption and decryption
2022-07-04 04:57:00 【Lzg_ na】
List of articles
1. summary
Encryption is divided into One way encryption
and Two way encryption
One way encryption : One way encryption is irreversible , After the ciphertext is generated, the original content cannot be obtained according to the ciphertext . Therefore, one-way encryption is often used to verify the integrity and originality of the content , Not for security . for example MD5 Algorithm
Two way encryption : Bidirectional encryption refers to the generation of ciphertext , It can be decrypted into plaintext . It is usually applied to secure transmission and permission Application . for example RSA Algorithm .
1.1 Introduction to bidirectional encryption
Bidirectional decryption can be roughly divided into Symmetric encryption
and Asymmetric encryption
Symmetric encryption
: Encryption and decryption use the same secret key
, Asymmetric encryption
: Encryption and decryption use different keys , Encryption uses Private key , Decryption use Public key , It has to be used in pairs .
1.1.1 Symmetric encryption
- advantage : Symmetric encryption and decryption algorithms are faster , Suitable for encrypting large amounts of data .
- shortcoming : Because encryption and decryption use the same key , Easy to crack , A large number of keys are needed to encrypt and decrypt different messages .
1.1.2 Asymmetric encryption
- advantage : The public key is encrypted , The private key is decrypted . Or sign with the private key , Use public key to verify signature . High safety , Private key and public key are kept separately , No public key and key transmission .
- shortcoming : Asymmetric encryption is very performance consuming , Very, very .
At this point, we must talk about the role of public key and private key :
Public and private keys must appear in pairs , Both can be used for encryption , But you must use the other party to decrypt . Different scenarios use different .
- Public key encryption , Private key decryption : Ensure ciphertext transmission , Highlight confidentiality .
- Private key encryption , Public key decryption : Sign and verify , Ensure that the signature has not been modified , Highlight reality .
边栏推荐
- The "functional art" jointly created by Bolang and Virgil abloh in 2021 to commemorate the 100th anniversary of Bolang brand will debut during the exhibition of abloh's works in the museum
- Sample template of software design document - learning / practice
- 【MATLAB】MATLAB 仿真模拟调制系统 — FM 系统
- 【MATLAB】MATLAB 仿真模拟调制系统 — SSB 系统
- Kivy教程之 自定义字体(教程含源码)
- Fault analysis | mongodb 5.0 reports an error, and the legal instruction solves it
- Annex I: power of attorney for 202x XXX attack and defense drill
- 附件二:攻防演练保密协议.docx
- 附件一:202x年xxx攻防演习授权委托书
- Self sharing of a graduate
猜你喜欢
令人头痛的延时双删
Secondary vocational group network security - memory Forensics
[Yugong series] go teaching course 001 in July 2022 - Introduction to go language premise
Beipiao programmer, 20K monthly salary, 15W a year, normal?
What is context?
抓包整理外篇fiddler———— 会话栏与过滤器
中科磐云—D模块解析以及评分标准
附件六:防守工作簡報.docx
定制一个自己项目里需要的分页器
Drozer tool
随机推荐
Fault analysis | mongodb 5.0 reports an error, and the legal instruction solves it
Annex III: scoring standard of the defender docx
【无标题】
Annex 2-2 confidentiality commitment docx
【MATLAB】通信信号调制通用函数 — 带通滤波器
Y55. Chapter III kubernetes from entry to proficiency -- HPA controller and metrics server (28)
【MATLAB】MATLAB 仿真数字带通传输系统 — ASK、 PSK、 FSK 系统
【MATLAB】MATLAB 仿真 — 低通高斯白噪声
Unity 接入天气系统
Deep understanding of redis -- bloomfilter
拼夕夕二面:说说布隆过滤器与布谷鸟过滤器?应用场景?我懵了。。
通过dd创建asm disk
STM32F1与STM32CubeIDE编程实例-74HC595驱动4位7段数码管
Correct the classpath of your application so that it contains a single, compatible version of com. go
Definition of DCDC power supply current
Self sharing of a graduate
附件一:202x年xxx攻防演习授权委托书
How do good test / development programmers practice? Where to go
附件六:防守工作簡報.docx
抓包整理外篇fiddler———— 会话栏与过滤器