当前位置:网站首页>Take you a minute to learn about symmetric encryption and asymmetric encryption
Take you a minute to learn about symmetric encryption and asymmetric encryption
2022-07-26 16:47:00 【I'm Zha Zha Hui】
List of articles
1、 Symmetric encryption
Use the same key for encryption and decryption
There is a key key, Encrypted data name=user password=123456. Use key Yes name and password Encrypt the other party's use key Yes name and password To decrypt Get the decrypted real data .
![(img-cyvdERf8-1658754333205)(C:\Users\26807\AppData\Roaming\Typora\typora-user-images\image-20220723161403047.png)]](/img/a9/00d94926bae7ae5ab0abfafbc20a1e.png)
Features of symmetric encryption : Symmetric encryption has high encryption strength , Hard to crack .
But in practical application, it faces a very thorny problem : How to save the key safely ?
2、 Asymmetric encryption
It refers to having a pair of keys ( Public and private keys ): Use the public key to encrypt the data , After encryption, only the private key can be decrypted .
![(img-Vgd5nHO9-1658754333206)(C:\Users\26807\AppData\Roaming\Typora\typora-user-images\image-20220723161355146.png)]](/img/b6/fa378d781737c6d31fe75760eabccd.png)
1. long-range Server received Client End user TopGun Login request for ,Server Send your public key to the user .
2.Client Use this public key , Encrypt password .
3.Client Send the encrypted password to Server End .
4. long-range Server Use your own private key , Decrypt login password , Then verify its legitimacy .
5. If the verification result , to Client Corresponding response .
The private key is Server Unique end , That's the guarantee Client Even if the login information of is stolen in the process of network transmission , There is no private key to decrypt , Ensure the security of data , This makes full use of the characteristics of asymmetric encryption .
ssh When connecting, you will use : encryption algorithm , Key exchange algorithm , Integrity check
ssh How to apply the encryption method in :ssh Both symmetric and asymmetric encryption are used .
Asymmetric encryption is used when authenticating user connections , Symmetric encryption encrypts data when the user starts transmitting data after connecting
What are the encryption algorithms of symmetric encryption ,
AES,DES,3DES
DES yes ⼀ A packet data encryption technology ( First, divide the data into fixed length ⼩ Data blocks , After entering ⾏ encryption ), Faster , optimum ⽤ On ⼤ Quantity data encryption ,⽽3DES yes ⼀ Species based on DES Encryption algorithm , send ⽤3 Different keys are the same ⼀ Grouped data blocks into ⾏3 Secondary encryption , So as to make the secret ⽂ Stronger ⾼.
Compare with DES and 3DES Algorithm ⽽⾔,AES The algorithm has more ⾼ The speed and resources make ⽤ efficiency , The security level is also higher ⾼ 了 , It is called the next ⼀ Generation encryption standard .
What encryption algorithms are needed for asymmetric encryption
RSA,DSA,ECC
RSA and DSA Safety and other ⽅⾯ The performance is almost the same ,⽽ECC It has a lot of superior performance , Including processing speed , Bandwidth requirements , Storage space and so on .
边栏推荐
- 怎么使用C语言嵌套链表实现学生成绩管理系统
- TensorFlow Lite源码解析
- [fluent -- advanced] packaging
- NUC 11 build esxi 7.0.3f install network card driver-v2 (upgraded version in July 2022)
- 工作流引擎在vivo营销自动化中的应用实践
- 结构体和类使用的区别
- Definition and relationship of derivative, differential, partial derivative, total derivative, directional derivative and gradient
- 微信小程序---网络数据请求
- DTS搭载全新自研内核,突破两地三中心架构的关键技术|腾讯云数据库
- 量化交易之数字货币篇 - 通过时间戳与方向来合并逐笔成交数据(大单合并)
猜你喜欢

Win11 auto delete file setting method

Guetzli simple to use

Alibaba Cloud Toolkit —— 项目一键部署工具

NUC 11 build esxi 7.0.3f install network card driver-v2 (upgraded version in July 2022)

结构体和类使用的区别

如何借助自动化工具落地DevOps|含低代码与DevOps应用实践

Win11怎么自动清理回收站?

What is the complexity often said during the interview?
最终一致性性分布式事务 TCC

2022-2023 topic recommendation of information management graduation project
随机推荐
公安部发出暑期旅游客运交通安全预警:手握方向盘 绷紧安全弦
How does win11 reinstall the system?
It turns out that cappuccino information security association does this. Let's have a look.
Replicationcontroller and replicaset of kubernetes
Guangzhou Municipal Safety Committee Office issued warnings and reminders on safety precautions in hot weather
Win11如何关闭共享文件夹
The difference and efficiency comparison of three methods of C # conversion integer
[e-mr] error recovery record of namenode
【Flutter -- 进阶】打包
Win11自动删除文件设置方法
Alibaba side: analysis of ten classic interview questions
Operating system migration practice: deploying MySQL database on openeuler
【开发教程9】疯壳·ARM功能手机-I2C教程
mysql锁机制(举例说明)
Marxan模型保护区优化与保护空缺甄选技术、InVEST生态系统中的应用
Win11怎么自动清理回收站?
Thinkphp历史漏洞复现
How does win11 automatically clean the recycle bin?
Linux Installation mysql8.0.29 detailed tutorial
Understanding JS foundation and browser engine