当前位置:网站首页>Encryption and decryption
Encryption and decryption
2022-07-04 04:57:00 【Lzg_ na】
List of articles
1. summary
Encryption is divided into One way encryption and Two way encryption
One way encryption : One way encryption is irreversible , After the ciphertext is generated, the original content cannot be obtained according to the ciphertext . Therefore, one-way encryption is often used to verify the integrity and originality of the content , Not for security . for example MD5 Algorithm
Two way encryption : Bidirectional encryption refers to the generation of ciphertext , It can be decrypted into plaintext . It is usually applied to secure transmission and permission Application . for example RSA Algorithm .
1.1 Introduction to bidirectional encryption
Bidirectional decryption can be roughly divided into Symmetric encryption and Asymmetric encryption Symmetric encryption : Encryption and decryption use the same secret key , Asymmetric encryption : Encryption and decryption use different keys , Encryption uses Private key , Decryption use Public key , It has to be used in pairs .
1.1.1 Symmetric encryption
- advantage : Symmetric encryption and decryption algorithms are faster , Suitable for encrypting large amounts of data .
- shortcoming : Because encryption and decryption use the same key , Easy to crack , A large number of keys are needed to encrypt and decrypt different messages .
1.1.2 Asymmetric encryption
- advantage : The public key is encrypted , The private key is decrypted . Or sign with the private key , Use public key to verify signature . High safety , Private key and public key are kept separately , No public key and key transmission .
- shortcoming : Asymmetric encryption is very performance consuming , Very, very .
At this point, we must talk about the role of public key and private key :
Public and private keys must appear in pairs , Both can be used for encryption , But you must use the other party to decrypt . Different scenarios use different .
- Public key encryption , Private key decryption : Ensure ciphertext transmission , Highlight confidentiality .
- Private key encryption , Public key decryption : Sign and verify , Ensure that the signature has not been modified , Highlight reality .
边栏推荐
- Annex 2-2 confidentiality commitment docx
- Wobo Union ended its strategic evaluation and decided to retain Bozi's business with excellent performance
- Error response from daemon: You cannot remove a running container 8d6f0d2850250627cd6c2acb2497002fc3
- Annex 4: scoring criteria of the attacker docx
- Kivy tutorial custom fonts (tutorial with source code)
- Operate the server remotely more gracefully: the practice of paramiko Library
- 【MATLAB】MATLAB 仿真数字基带传输系统 — 双极性基带信号(余弦滚降成形脉冲)的眼图
- 令人头痛的延时双删
- appliedzkp的zkevm(12)State Proof
- 【MATLAB】MATLAB 仿真 — 窄带高斯白噪声
猜你喜欢

Download kicad on Alibaba cloud image station

Use units of measure in your code for a better life

Fault analysis | mongodb 5.0 reports an error, and the legal instruction solves it

Many founders of technology companies provided enterpriser first with a round C financing of up to US $158million to help it invest in the next generation of global innovators

2022广东省赛——编码信息获取 解析flag

Maui introductory tutorial series (5.xaml and page introduction)

Drozer tool

MySQL JDBC programming

附件五:攻击过程简报.docx

令人头痛的延时双删
随机推荐
Zhongke Panyun - 2022 Guangxi reverse analysis ideas
The first introduction, stages and methods of defense system breakthrough from the perspective of the red team
LeetCode136+128+152+148
【MATLAB】MATLAB 仿真数字基带传输系统 — 双极性基带信号(余弦滚降成形脉冲)的眼图
Talking about JVM
海力士EMMC5.0及5.1系列对比详解
Deep parsing structured exception handling (SEH) - by Matt Pietrek
【MATLAB】MATLAB 仿真数字基带传输系统 — 数字基带传输系统
Unity 接入天气系统
The second case analysis of the breakthrough of defense system from the perspective of the red team
Binary search tree
中职组网络安全—内存取证
Deep understanding of redis -- bloomfilter
Annex VI: defense work briefing docx
中科磐云—D模块解析以及评分标准
【Go】数据库框架gorm
【MATLAB】MATLAB 仿真 — 窄带高斯白噪声
STM32F1与STM32CubeIDE编程实例-74HC595驱动4位7段数码管
Formatted text of Kivy tutorial (tutorial includes source code)
VSCode的有用插件