当前位置:网站首页>Take you a minute to learn about symmetric encryption and asymmetric encryption
Take you a minute to learn about symmetric encryption and asymmetric encryption
2022-07-26 16:47:00 【I'm Zha Zha Hui】
List of articles
1、 Symmetric encryption
Use the same key for encryption and decryption
There is a key key, Encrypted data name=user password=123456. Use key Yes name and password Encrypt the other party's use key Yes name and password To decrypt Get the decrypted real data .
![(img-cyvdERf8-1658754333205)(C:\Users\26807\AppData\Roaming\Typora\typora-user-images\image-20220723161403047.png)]](/img/a9/00d94926bae7ae5ab0abfafbc20a1e.png)
Features of symmetric encryption : Symmetric encryption has high encryption strength , Hard to crack .
But in practical application, it faces a very thorny problem : How to save the key safely ?
2、 Asymmetric encryption
It refers to having a pair of keys ( Public and private keys ): Use the public key to encrypt the data , After encryption, only the private key can be decrypted .
![(img-Vgd5nHO9-1658754333206)(C:\Users\26807\AppData\Roaming\Typora\typora-user-images\image-20220723161355146.png)]](/img/b6/fa378d781737c6d31fe75760eabccd.png)
1. long-range Server received Client End user TopGun Login request for ,Server Send your public key to the user .
2.Client Use this public key , Encrypt password .
3.Client Send the encrypted password to Server End .
4. long-range Server Use your own private key , Decrypt login password , Then verify its legitimacy .
5. If the verification result , to Client Corresponding response .
The private key is Server Unique end , That's the guarantee Client Even if the login information of is stolen in the process of network transmission , There is no private key to decrypt , Ensure the security of data , This makes full use of the characteristics of asymmetric encryption .
ssh When connecting, you will use : encryption algorithm , Key exchange algorithm , Integrity check
ssh How to apply the encryption method in :ssh Both symmetric and asymmetric encryption are used .
Asymmetric encryption is used when authenticating user connections , Symmetric encryption encrypts data when the user starts transmitting data after connecting
What are the encryption algorithms of symmetric encryption ,
AES,DES,3DES
DES yes ⼀ A packet data encryption technology ( First, divide the data into fixed length ⼩ Data blocks , After entering ⾏ encryption ), Faster , optimum ⽤ On ⼤ Quantity data encryption ,⽽3DES yes ⼀ Species based on DES Encryption algorithm , send ⽤3 Different keys are the same ⼀ Grouped data blocks into ⾏3 Secondary encryption , So as to make the secret ⽂ Stronger ⾼.
Compare with DES and 3DES Algorithm ⽽⾔,AES The algorithm has more ⾼ The speed and resources make ⽤ efficiency , The security level is also higher ⾼ 了 , It is called the next ⼀ Generation encryption standard .
What encryption algorithms are needed for asymmetric encryption
RSA,DSA,ECC
RSA and DSA Safety and other ⽅⾯ The performance is almost the same ,⽽ECC It has a lot of superior performance , Including processing speed , Bandwidth requirements , Storage space and so on .
边栏推荐
- How to use C language nested linked list to realize student achievement management system
- Win11 auto delete file setting method
- Comprehensively design an oppe homepage -- the design of the top and head
- vlang捣鼓之路
- Acl-ijcai-sigir top conference paper report meeting (AIS 2022) Note 3: dialogue and generation
- 快速学会配置yum的本地源和网络源,并学会yum的使用
- Guangzhou Municipal Safety Committee Office issued warnings and reminders on safety precautions in hot weather
- Win11怎么重新安装系统?
- 综合设计一个OPPE主页--顶部,头部的设计
- 2022牛客暑期多校训练营2(BDGHJKL)
猜你喜欢

Digital intelligence transformation, management first | jnpf strives to build a "full life cycle management" platform
It turns out that cappuccino information security association does this. Let's have a look.

Tcpdump命令详解

C#转整型的三种方式的区别以及效率对比

C#事件和委托的区别

综合设计一个OPPE主页--布局与初始化

Re7: reading papers fla/mlac learning to predict charges for critical cases with legal basis

Matlab paper illustration drawing template issue 40 - pie chart with offset sector

2022软件测试技能 Postman+newman+jenkins 持续集成 实战教程

Linux Installation mysql8.0.29 detailed tutorial
随机推荐
How to use C language nested linked list to realize student achievement management system
TCP 和 UDP 可以使用相同端口吗?
微信小程序---网络数据请求
PXE高效批量网络装机
搭建typora图床
JS API summary of Array Operations
数字化转型怎么就那么的难?!
公共数据如何兼顾开放利用和隐私安全合规?
如何借助自动化工具落地DevOps|含低代码与DevOps应用实践
中金证券vip账户找谁开安全啊?
Thinkphp历史漏洞复现
2022牛客暑期多校训练营1(ACDGIJ)
Marxan模型保护区优化与保护空缺甄选技术、InVEST生态系统中的应用
公安部发出暑期旅游客运交通安全预警:手握方向盘 绷紧安全弦
Re8:读论文 Hier-SPCNet: A Legal Statute Hierarchy-based Heterogeneous Network for Computing Legal Case
Pyqt5 rapid development and practice 3.4 signal and slot correlation
PyQt5快速开发与实战 3.2 布局管理入门 and 3.3 Qt Designer实战应用
Happy 10th birthday, clojure
From SiCp to LISP video replay
How to implement Devops with automation tools | including low code and Devops application practice