Differences between encryption and digital signature

Source: Internet
Author: User

Comments: What is encryption? In a very basic word, encryption is a password-based method for sending information. Only those with the correct key can unlock the password for this information. For others, this information looks like a series of random letters, numbers, and symbols. Encryption is especially important if you want to send sensitive information that should not be viewed by others. What is encryption?

In a very basic word, encryption is a password-based method for sending information. Only those with the correct key can unlock the password for this information. For others, this information looks like a series of random letters, numbers, and symbols. Encryption is especially important if you want to send sensitive information that should not be viewed by others. Because emails are sent on the Internet and may be intercepted by attackers, it is important to add an additional protection layer for sensitive information.

What is the difference between encryption and digital signature?

Like digital signatures, public key encryption uses software such as PGP to convert information using mathematical algorithms and relies on public and private keys. However, there is a difference between encryption and digital signature. The purpose of encryption is To Secretly hide the content by translating the information into a password. The purpose of digital signature is to verify the integrity and identity of a message sender and that the content has not been modified. Although encryption and digital signatures can be used independently, you can also use digital signatures for encrypted information.

When you sign a message, you use your private key. Anyone with your public key can verify that the signature is valid. When you encrypt an information, you use this public key for the person receiving your information, and use its or her private key to decode this information. The receiver of this information should be the only person who can watch this information to keep their private keys confidential and use passwords to protect them.

How does encryption take effect?

1. Obtain the public key of the person you want him to be able to read the information. If you get this key from a public key ring, you can directly contact that person and use the key to verify that a series of related letters and numbers are correct fingerprints.

2. Use their public key to encrypt this email. Most email client software has the ability to do this easily.

3. When this person receives the information, he or she will be able to decrypt the information.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.