Encryption and decryption of Linux

Source: Internet
Author: User
Tags decrypt asymmetric encryption

Make some extra money on the way to the ideal! =.=!


  • Security mechanisms: encryption/decryption, digital signature, access control, data integrity, authentication switching, flow control, routing control

  • Key: Controls the instructions for encrypting and decrypting processes

  • Algorithm: A set of rules that specify encryption and decryption

  • Encryption, decryption: That is, the key through the specified algorithm to do a series of operations

  • Therefore, the security of encryption and decryption is not nearly dependent on the encryption algorithm, the key security is even more important

    • symmetric encryption: Both sides use the same encryption method to encrypt and decrypt the same key

      • Advantages: encryption, decryption speed block

      • Cons:

        • It is difficult for the two parties to securely transfer the key to each other during the first communication

        • because no two users need to have a corresponding key, so the key is too many, difficult to manage

        • does not provide integrity authentication, so it is difficult to verify the identity of the sender and receiver

      • common algorithms: DES (Basic No), 3DES, AES, Blowfish, Twofish, Ieda, RC6, CAST5

    • Asymmetric encryption (public key cryptography): Decryption and decryption are performed separately using key pairs

      • Encrypt with public key, must decrypt with corresponding private key, encrypt with private key, must decrypt with corresponding public key

      • private key: for personal use only;

      • cons: Long key, long time

      • commonly used for: digital signatures , key exchange, and identity authentication

      • Common algorithms: RSA, DSA (for digital signatures), ELGamal

    • One-way encryption: Encryption by calculating the signature of a piece of data

      • Features: fixed length output regardless of original data size
        Irreversible: Unable to use the resulting data to reverse the decryption
        Avalanche effect: Small changes that lead to dramatic changes in results

      • For: Verifying the integrity of data

      • Common algorithms: MD5, SHA1, SHA256, SHA384, SHA512, CRC32











A key is an instruction that controls the process of encrypting and decrypting. The algorithm is a set of rules that specify how to encrypt and decrypt. Therefore, security is not only dependent on the encryption algorithm itself, the security of key management is more important

This article is from the "Ops Dog" blog, make sure to keep this source http://yunweigou.blog.51cto.com/6299641/1637108

Encryption and decryption of Linux

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.