In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-22 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/02 Report--
Xiaobian to share with you what are the characteristics of symmetric key system and public key cryptosystem in the computer, I believe most people do not know much about it, so share this article for your reference. I hope you will learn a lot after reading this article. Let's learn about it!
The characteristics of symmetric key system: fast encryption and decryption speed and high security intensity, but the key is difficult to manage and transmit, so it is not suitable to be used alone in the network; the characteristics of public key cryptosystem: high intensity of secrecy, simple key distribution and management, easy to implement digital signature.
Symmetric secret Korean cryptosystem
Symmetric secret Korean cryptosystem, also known as single key cryptosystem, refers to the cryptosystem with the same encryption key and decryption key. The confidentiality of this cryptosystem mainly depends on the secrecy of the key, and its encryption and decryption algorithms are public.
In order to ensure the security of the symmetric key cryptosystem, the encryption algorithm must be complex enough, and the key must be kept secret and have enough key space, so that the attacker can intercept the ciphertext and know the encryption algorithm. Still can't restore the plaintext. The most influential symmetric key cryptosystem is the data encryption standard DES issued by the National Bureau of Standards of the United States in 1977.
The characteristics of the symmetrical secret Korean cryptosystem:
Fast encryption and decryption
High safety intensity
Keys are difficult to manage and transmit, and are not suitable for separate use in the network.
Public key cryptosystem
The public key cryptosystem is an asymmetric key, which has the advantages of fast operation and easy key generation.
(1) High intensity of confidentiality
Its theoretical basis is based on the difficulty of decomposing large prime numbers in number theory. when n is greater than 2048 bits, the current algorithm can not decipher RSA in effective time.
(2) key distribution and management are simple and convenient.
In RSA system, encryption key and decryption key are different and separated from each other. The encryption key can be made public, the decryption key can be kept secretly by the user, and the number of keys kept in secret is reduced, which makes key distribution more convenient and key management convenient.
(3) Digital signature is easy to implement.
In the RSA system, only the receiver uses his own decryption key to sign the plaintext, and anyone else can use the public key to verify the signed text, but can not forge it.
These are all the contents of the article "what are the characteristics of symmetric key system and public key cryptosystem in computer". Thank you for reading! I believe we all have a certain understanding, hope to share the content to help you, if you want to learn more knowledge, welcome to follow the industry information channel!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.