Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

What is symmetrical encryption and asymmetric encryption?

2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

With the development trend of information management and intelligent society, people's understanding of the necessity of network information security and information secrecy is constantly improving. therefore, in 1997, the British National Bureau of Standards issued and implemented the British Database encryption Standard (DES). At the beginning of the omni-directional intervention in the scientific research and application of cryptography, the encryption technologies selected are DES, RSA, SHA and so on. With the continuous improvement of the requirements for the compressive strength of data encryption, there are many encryption technologies, which can be divided into several categories, symmetric encryption algorithm, asymmetric encryption algorithm and Hash optimization algorithm. What is symmetric encryption? What is asymmetric encryption?

Refers to encryption techniques that use the same key to encrypt data and decipher it. The advantage of symmetric encryption algorithm depends on the high-speed operation of encryption and decryption and the difficulty of deciphering when using long keys. Assuming that two customers must use symmetric encryption to encrypt data and then exchange statistical data, the customer must have at least two keys and exchange applications. If there are n customers in the company, then all companies must have a total of n × (nMel 1) keys. The conversion and distribution of keys will become a nightmare for the company's information units. The security factor of the symmetric encryption algorithm lies in the storage condition of the data encryption key, but it is impossible to require everyone in the company who owns the key to keep the traditional secret. They usually leak the key inadvertently-- if the key of a customer's application is obtained by the invader, the aggressor will be able to load all the text documents encrypted by the customer's key data, if all companies use the same data encryption key. Then the security of all company text documents is out of the question.

Common symmetric encryption algorithms: DES, 3DES, DESX, Blowfish, IDEA, RC4, RC5, RC6 and AES

Asymmetric encryption

Refers to data encryption and deciphering the application of different key encryption technology, also known as public and private key data encryption. Suppose that two customers want data encryption and exchange statistical data and exchange public keys with each other. In application, the other party encrypts the data with the other party's public key, and the other party can decipher it with its own private key. If there are n customers in the company, the company must convert to n pairs of keys and distribute n public keys. Because the public key can be published, customers can store their own private keys, so the distribution of data encryption keys will become more and more easy. In addition, because the private key of each customer is unique, an ordinary user can ensure that the sender cannot deny that the information content has been pushed except that the source of the information content can be authenticated according to the sender's public key. The disadvantage of asymmetric encryption is that the encryption and decryption rate is much slower than symmetric encryption, and in some extreme cases, it is even 1000 times slower than asymmetric encryption.

Common asymmetric encryption algorithms: RSA, ECC (for mobile terminals), Diffie-Hellman, El Gamal, DSA (for electronic signatures)

The efficiency of encryption technology can generally be considered according to the complexity of the optimization algorithm, the length of the key (the longer the key is, the more secure it is), the encryption and decryption rate, and so on. Among the optimization algorithms, except for the insufficient length of DES keys, slow MD2 rate and slow elimination of SHA-1, other optimization algorithms are still used in encryption system commodities at the present stage. This is about what is symmetric encryption? What is the knowledge of asymmetric encryption.

With the development of Internet information, network information security is becoming more and more important. The website offers free https for users in need to apply. At the same time, we are happy to provide technical service support to join hands to build into a new network era!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report