Brief Introduction to encryption technology

Source: Internet
Author: User

 

Encryption technology is the most common security and confidentiality means. It turns important data into garbled (encrypted) transmission by technical means, and restores (decrypts) data by the same or different means after arriving at the destination ).

Encryption technology includes two elements: algorithm and key. An algorithm is a process that combines common or understandable information with a string of numbers (KEYS) to generate incomprehensible ciphertext data, A key is an algorithm used to encode and decrypt data. In terms of security and confidentiality, appropriate key encryption technology and management mechanisms can be used to ensure the security of network information and communication.

What is encryption technology? Encryption technology is the main security and confidentiality measure adopted by e-commerce. It is the most common security and confidentiality measure. It uses technical means to convert important data into garbled (encrypted) transmission, restore (decrypt) with the same or different means after arriving at the destination ). Encryption technology includes two elements: algorithm and key. The algorithm combines common text (or understandable information) with a key to generate incomprehensible ciphertext, A key is an algorithm used to encode and decode data. In terms of security and confidentiality, appropriate key encryption technology and management mechanisms can be used to ensure the security of network information communication. The cryptographic systems of key encryption technology are divided into symmetric key systems and asymmetric key systems. Correspondingly, there are two types of data encryption technologies: symmetric encryption (private key encryption) and asymmetric encryption (public key encryption ). Symmetric Encryption is typically represented by the DES (Data Encryption Standard) algorithm. asymmetric Encryption is typically represented by the RSA (Rivest Shamir Ad1eman) algorithm. Symmetric encryption has the same encryption key and decryption key, While asymmetric encryption has different encryption keys. the encryption key can be made public and the decryption key must be kept confidential.

Types of encryption technologies: symmetric encryption (private key encryption), asymmetric encryption (public key encryption), and individual encryption.

Symmetric encryption: symmetric encryption uses symmetric encryption technology. It features file encryption and decryption using the same key, that is, the encryption key can also be used as the decryption key, this method is called symmetric encryption algorithm in cryptography. symmetric encryption algorithms are simple and quick to use, have short keys, and are difficult to crack. Besides the Data Encryption Standard (DES ), another symmetric key encryption system is the International Data Encryption Algorithm (IDEA), which is better than DNS encryption and has less requirements on computer functions. IDEA encryption standards are used by PGP (Pretty Good Privacy) systems.

Type of symmetric encryption: DES (Data Encryption Standard) uses a 56-bit key. AES: Advanced Encryption Standard. 3DES: Three-Ring encryption standard, which serves as the standard of the current encryption algorithm.

Asymmetric encryption: public key encryption. asymmetric encryption algorithms require two keys: public key and private key ). A public key is a pair of private keys. If a public key is used to encrypt data, only the corresponding private key can be used for decryption. If a private key is used to encrypt data, only the corresponding public key can be decrypted. Because encryption and decryption use two different keys, this algorithm is called asymmetric encryption algorithm. Its features include DSA, RSA, and EIGAMAL. asymmetric encryption technology, which is used for encryption and decryption and identity authentication. Its disadvantage is that it is slow and occupies space memory.

Single-item encryption: A single-item encryption is used to calculate the feature value of a piece of data. Prevents brute-force cracking. To ensure data integrity: the output length is fixed: Types of individual encryption technologies: 1. md5 128bit 2. SHA1, combined with hash calculation, the efficiency of encryption with a length of 128bit is relatively low. The second data segment is encrypted in a single item, and the data code of the second data segment is proofread. If the complete surface data is complete.

PKI is a Key management platform that complies with established standards, it can provide cryptographic services such as encryption and digital signatures and the necessary key and certificate management systems for all network applications.

The original single-key encryption technology uses a specific encryption key to encrypt data. The decryption key is the same as the encryption key, which is called symmetric encryption algorithm. If the encryption method based on the theory of this encryption technology is used to encrypt data transmitted over the network, security vulnerabilities are inevitable. When sending encrypted data, you also need to transmit the key over the network to notify the recipient. When the third party intercepts encrypted data, you only need to intercept the corresponding key to decrypt and use the data or tamper with the data illegally.

Different from the original single-key encryption technology, PKI adopts asymmetric encryption algorithms, that is, keys encrypted from the original text to the encrypted text are different from keys decrypted from the ciphertext to the original text, to prevent a third party from decrypting the ciphertext after obtaining the key.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.