The Encryption Model for Secured Data Transmission Some examples of algorithms that use this technique include the Rivest–Shamir–Adleman algorithm (RSA), Diffie - Hellman Key Exchange (DHE), and the Digital Signature Algorithm (DSA). The sender and receiver use different keys for encryption and decryption. Asymmetric Key Cryptography (Public key): With this technique, each person has two keys: the Private (secret and accessible to the creator) and Public keys (freely available to anyone).Some examples of algorithms that use this technique include One Time Pad cipher, Vernam cipher, Playfair, Row column cipher, and Data Encryption Standard (DES). Symmetric-key Cryptography (Private key): With this technique, the encryption and decryption keys are both known to the sender and receiver.In general, cryptography employs two strategies: The sender often employs an encryption key to lock the message, while the recipient uses a decryption key to unlock the message. The purpose of cryptography is to ensure secure communication between two people or devices who are connecting through insecure channels. This introduces secrecy in information security. Cryptography uses encryption and decryption to conceal messages.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |