当前位置:网站首页>Encryption and decryption
Encryption and decryption
2022-07-04 04:57:00 【Lzg_ na】
List of articles
1. summary
Encryption is divided into One way encryption and Two way encryption
One way encryption : One way encryption is irreversible , After the ciphertext is generated, the original content cannot be obtained according to the ciphertext . Therefore, one-way encryption is often used to verify the integrity and originality of the content , Not for security . for example MD5 Algorithm
Two way encryption : Bidirectional encryption refers to the generation of ciphertext , It can be decrypted into plaintext . It is usually applied to secure transmission and permission Application . for example RSA Algorithm .
1.1 Introduction to bidirectional encryption
Bidirectional decryption can be roughly divided into Symmetric encryption and Asymmetric encryption Symmetric encryption : Encryption and decryption use the same secret key , Asymmetric encryption : Encryption and decryption use different keys , Encryption uses Private key , Decryption use Public key , It has to be used in pairs .
1.1.1 Symmetric encryption
- advantage : Symmetric encryption and decryption algorithms are faster , Suitable for encrypting large amounts of data .
- shortcoming : Because encryption and decryption use the same key , Easy to crack , A large number of keys are needed to encrypt and decrypt different messages .
1.1.2 Asymmetric encryption
- advantage : The public key is encrypted , The private key is decrypted . Or sign with the private key , Use public key to verify signature . High safety , Private key and public key are kept separately , No public key and key transmission .
- shortcoming : Asymmetric encryption is very performance consuming , Very, very .
At this point, we must talk about the role of public key and private key :
Public and private keys must appear in pairs , Both can be used for encryption , But you must use the other party to decrypt . Different scenarios use different .
- Public key encryption , Private key decryption : Ensure ciphertext transmission , Highlight confidentiality .
- Private key encryption , Public key decryption : Sign and verify , Ensure that the signature has not been modified , Highlight reality .
边栏推荐
- Annex VI: defense work briefing docx
- 6-4 vulnerability exploitation SSH banner information acquisition
- appliedzkp的zkevm(12)State Proof
- The first introduction, stages and methods of defense system breakthrough from the perspective of the red team
- 记几个智能手表相关芯片 蓝牙芯片 低功耗
- 【MATLAB】MATLAB 仿真 — 模拟调制系统 之 AM 调制过程
- MIN_ RTO dialog
- 每日刷题记录 (十二)
- Developing mqtt access program under QT
- "Don't care too much about salary when looking for a job", this is the biggest lie I've ever heard
猜你喜欢

《Cross-view Transformers for real-time Map-view Semantic Segmentation》论文笔记

Notes on the paper "cross view transformers for real time map view semantic segmentation"

中科磐云—模块A 基础设施设置与安全加固 评分标准

Flutter ‘/usr/lib/libswiftCore.dylib‘ (no such file)

rac删除损坏的磁盘组

Developing mqtt access program under QT

Yolov6 practice: teach you to use yolov6 for object detection (with data set)

What is context?

Flutter 调用高德地图APP实现位置搜索、路线规划、逆地理编码
![[cloud native] those lines of code that look awesome but have a very simple principle](/img/6d/220c51a643263f431fb57c97c4b8ff.png)
[cloud native] those lines of code that look awesome but have a very simple principle
随机推荐
LeetCode136+128+152+148
Flutter ‘/usr/lib/libswiftCore.dylib‘ (no such file)
【MATLAB】通信信号调制通用函数 — 插值函数
Eig launched Grupo Cerro, a renewable energy platform in Chile
【MATLAB】MATLAB 仿真 — 窄带高斯白噪声
【MATLAB】MATLAB 仿真 — 低通高斯白噪声
附件五:攻击过程简报.docx
Maui introductory tutorial series (5.xaml and page introduction)
[wechat applet] good looking carousel map component
我们认为消费互联网发展到最后,依然会局限于互联网行业本身
由于使用flash存放参数时,擦除掉了flash的代码区导致进入硬件错误中断
测试 CS4344 立体声DA转换器
[cloud native] those lines of code that look awesome but have a very simple principle
What should a novice pay attention to when looking for an escort
(pointer) write function void fun (int x, int *pp, int *n)
Annex VI: defense work briefing docx
appliedzkp zkevm(11)中的EVM Proof
CRS-4013: This command is not supported in a single-node configuration.
1. Mx6u-alpha development board (LED drive experiment in C language version)
Create ASM disk through DD