Comprehensive use of symmetric algorithms and asymmetric algorithms

Source: Internet
Author: User

SymmetricAlgorithmUsed in combination with asymmetric algorithms, such:

The sender has a public key and the receiver has a private key.

1. Sender:

First, the sender generates a random symmetric key, encrypts the data with the symmetric key, and puts it in a digital envelope. Then, the sender uses the public key to package the random symmetric key, put it in a digital envelope, and finally transmits the digital envelope to the receiver.

2 "receiving end:

After receiving the data, divide the number envelope into two parts: the password package and the encrypted data. Then, use your private key to decrypt the "password package" and retrieve the symmetric password, use a symmetric key to restore the encrypted data.

 

If the data to be transmitted is too long, the data encrypted with symmetric keys is faster than that of asymmetric keys, and then packaged with symmetric keys.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.