In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/03 Report--
What are the main encryption methods commonly used? Many novices are not very clear about this. In order to help you solve this problem, the following editor will explain it in detail. People with this need can come and learn. I hope you can gain something.
At present, there are two main encryption methods, which are private key encryption and public key encryption. The characteristic of private key encryption is that both the sender and the receiver of the information need to use the same key, which is symmetrical, which is also called symmetric encryption. Public key encryption, also known as asymmetric encryption, uses a pair of keys, one is a private key and the other is a public key.
At present, there are mainly two kinds of encryption methods, which are private key encryption and public key encryption.
Private key encryption
Private key encryption means that when communicating between An and B users on the computer network, in order to protect the plaintext information to be transmitted from being stolen by a third party, the sender uses key A to encrypt the information to form ciphertext M and send it to the receiving party B. the receiving party B decrypts the received ciphertext M with the same key A to get the plaintext information, so as to complete the purpose of ciphertext communication.
This kind of information encryption transmission is called private key encryption.
Features of private key encryption:
One of the most important features of private key encryption is that both the sender and the receiver of information need to use the same key, which is symmetrical, so private key encryption is also called symmetric key encryption.
Private key encryption principle:
Private encryption algorithms use a single private key to encrypt and decrypt data. Because any party with a key can use the key to decrypt data, it is necessary to ensure that the key is not authorized by the agent.
Public key encryption
Public key encryption (public-key cryptography), also known as asymmetric encryption (asymmetric cryptography), is a type of cryptographic algorithm that requires a pair of keys, one private key and the other public key.
The two keys are mathematically related, and the information encrypted with a user key can only be decrypted with the user's decryption key. If you know one of them, you can't calculate the other. Therefore, if one of a pair of keys is disclosed, it will not endanger the secret nature of the other. A public key is called a public key; a private key is a private key.
Is it helpful for you to read the above content? If you want to know more about the relevant knowledge or read more related articles, please follow the industry information channel, thank you for your support.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.