Documente Academic
Documente Profesional
Documente Cultură
208
Symmetric Encryption
• Uses a single key to both encrypt and decrypt information
• Also known as a secret-key algorithm
• The key must be kept a “secret” to maintain security
• This key is also known as a private key
• Follows the more traditional form of cryptography with key
lengths ranging from 40 to 256 bits
209
Symmetric Key Algorithms
210
Asymmetric Encryption
• Also called public-key cryptography
• Keep private key private
• Anyone can see public key
• Separate keys for encryption and decryption (public
and private key pair)
• Examples of asymmetric key algorithms:
• RSA, DSA, Diffie-Hellman, El Gamal, Elliptic Curve and
PKCS
211
Asymmetric Encryption
LAB
212
Asymmetric Encryption
LAB
213
Asymmetric Encryption
LAB
214
Asymmetric Encryption
LAB
215
Public Key Infrastructure (PKI)
216