Joke Collection Website - Mood Talk - Briefly talk about the principles and differences between symmetric encryption and asymmetric encryption
Briefly talk about the principles and differences between symmetric encryption and asymmetric encryption
The principle of symmetric encryption is that the data sender processes the plaintext (original data) and encryption key together with a special encryption algorithm, turning it into a complex encrypted ciphertext and sending it out. After the receiver receives the ciphertext, if it wants to decipher the original text, it needs to use the encryption key and the inverse algorithm of the same algorithm to decrypt the ciphertext in order to restore it to readable plaintext.
The principle of asymmetric encryption is that Party A first generates a pair of keys and uses one of them as a public key; Party B, who obtains the public key, then uses the key to encrypt the information that needs to be encrypted. Then it is sent to Party A; Party A then uses another corresponding private key to decrypt the encrypted information, thus realizing confidential data transmission.
The difference between symmetric encryption and asymmetric encryption is: different keys, different security, and different digital signatures.
1. Different keys
1. Symmetric encryption: Symmetric encryption uses the same key for encryption and decryption.
2. Asymmetric encryption: Asymmetric encryption does not use the same key for encryption and decryption. Two keys are needed for encryption and decryption.
2. Different security
1. Symmetric encryption: If symmetric encryption is used to transmit encrypted files through the network, then no matter what method is used to tell the other party the key, it may be tapping.
2. Asymmetric encryption: Asymmetric encryption contains two keys, and only the "public key" can be disclosed. The recipient only needs to use the one he already holds. The private key is decrypted, so that security problems caused by the key during transmission can be well avoided.
3. Digital signatures are different
1. Symmetric encryption: Symmetric encryption cannot be used for digital signatures and digital authentication.
2. Asymmetric encryption: Asymmetric encryption can be used for digital signatures and digital authentication.
- Previous article:A short sentence praising pursuit
- Next article:What should I do if there is always red blood in the whites of my eyes?
- Related articles
- The new house yangko team will perform how to make friends.
- On Physics of Guangdong Senior High School Entrance Examination
- What are the advantages and disadvantages of investing in gold?
- Feel the beautiful mood of nature, tell me about it.
- ? What is suitable for moving in your new house?
- Datong retired in 2022. Did you pay for the fire?
- Some people say that the infidelity of Wu Min, the "perfect partner", is a sign. Can someone tell us where it came from?
- See you in 221. I'll talk about it in 222.
- How to coax your girlfriend when she has her period?
- Watch a movie and send a circle of friends to collect 40 copies.