"Java-encryption Algorithm" symmetric encryption, asymmetric encryption, one-way hashing

Source: Internet
Author: User
Tags hmac asymmetric encryption

When it comes to encryption, it's reminiscent of digital signatures, what are the two often confusing concepts?

Encryption: Encryption is a way to send information in a password. Only the person with the correct key can unlock the password for this message. For others, the message looks like a series of random letters, numbers, and symbols. Encryption is especially important if you want to send sensitive information that should not be made visible to others.

Digital Signature: Digital signature is a kind of common physical signature written on paper, but it uses the technology of public key cryptography to identify the digital information method. A set of digital signatures typically defines two complementary operations, one for signing and the other for validation.

The difference between encryption and digital signature
As with digital signatures, public key cryptography uses software such as PGP, which transforms information using mathematical algorithms and relies on public and private keys. However, encryption and digital signatures are different, and the purpose of encryption is to secretly hide the content by translating the information into passwords. The purpose of a digital signature is completeness and identity identification, verifying the sender of a message and stating that the content has not been modified. Although encryption and digital signatures can be used separately, you can also use digital signatures for encrypted information.

When you sign a message, you use your private key, and anyone with your public key can verify that the signature is legitimate. When you encrypt a message, you use the public key for the person receiving your message and use his or her private key to decode the message. For people who want to keep their private key secret and use a password to protect the keys, the recipient of this information should be the only person who can watch this information.

Algorithm Classification
One, one-way hashing algorithm: belongs to the digest algorithm, is not a cryptographic algorithm, the function is to change any long input message string into a fixed long output string of a function
BASE64 (strictly speaking, it belongs to the encoding format, not the encryption algorithm)
MD5 (Message Digest algorithm 5, Information Digest algorithm)
SHA (Secure Hash algorithm, security hashing algorithm)
HMAC (Hash message authentication code, hash messages authentication code)
CRC (cyclical redundancy check, cyclic redundant code check)

Symmetric encryption algorithm: The encryption key is the same as the decryption key
DES (data encryption, standard algorithm for encryption)
AES (Advanced encryption, premium Encryption Standard)
PBE (password-based encryption, password-based authentication)
RC5 (variable-parameter block cipher algorithm)
BLOWFISH (symmetric key block encryption algorithm)

Three, asymmetric encryption algorithm: Encryption key and decryption key is not the same
RSA (the name of the algorithm is named after the inventor: Ron Rivest, Adishamir and Leonard Adleman)
DH (Diffie-hellman algorithm, key-consistent protocol)
Elgamal (can be used for both data encryption and digital signatures)
DSA (digital Signature algorithm, digitally signed)
ECC (Elliptic Curves cryptography, Elliptic curve algorithm)
Merkle-hellman (knapsack algorithm)
Miller Rabin algorithm (prime number test algorithm)

Resources

    • Digital signatures
    • Encryption
    • One-way hashing algorithm
    • Symmetric encryption algorithm
    • Asymmetric encryption algorithm
    • BASE64 algorithm
    • MD5 algorithm
    • SHA algorithm
    • HMAC algorithm
    • CRC algorithm
    • Des algorithm
    • AES algorithm
    • PBE algorithm
    • RC5 algorithm
    • Blowfish algorithm
    • RSA algorithm
    • Diffie-hellman algorithm
    • ElGamal algorithm
    • DSA algorithm
    • Elliptic Curve algorithm
    • Merkle-hellman Backpack algorithm
    • Miller Rabin algorithm

Copyright NOTICE: This article for Bo Master original article, without Bo Master permission not reproduced.

"Java-encryption Algorithm" symmetric encryption, asymmetric encryption, one-way hashing

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.