Encryption and decryption techniques for encryption software applications

Source: Internet
Author: User

Encryption technologyIt is the most common means of security and confidentiality. The main data is transferred by using technical means into garbled (encrypted), and restored (decrypted) by similar or different means after the target location is reached ).

Encryption technology elements

It contains two elements: algorithm and key. an algorithm is a process that combines general information or understandable information with a string of numbers (KEYS) to produce an incomprehensible ciphertext, A key is an algorithm used to encode and decrypt data. in terms of security and confidentiality, we can use the appropriate key encryption technology and governance mechanism to ensure information communication insurance for networks.

1. What is encryption?

Encryption technology is an important security and confidentiality method adopted by e-commerce. It is the most common security and confidentiality means. It uses technical means to convert important data into garbled (encrypted) transmission, restore (decrypt) with the same or different means after arriving at the destination ). encryption technology includes two elements: algorithm and key. the algorithm combines common text (or understandable information) with a key to generate incomprehensible ciphertext, A key is an algorithm used to encode and decode data.

In terms of security and confidentiality, appropriate key encryption technology and management mechanisms can be used to ensure the security of network information and communication. the cryptographic systems of key encryption technology are divided into symmetric key systems and asymmetric key systems. correspondingly, there are two types of data encryption technologies: symmetric encryption (private key encryption) and asymmetric encryption (public key encryption ).

Symmetric encryption is represented by the Data Encryption Standard (DES, DataEncryptionStandard) algorithm. asymmetric encryption is usually represented by the RSA (RivestShamirAd1eman) algorithm. symmetric encryption has the same encryption key and decryption key, While asymmetric encryption has different encryption keys. However, encryption keys must be kept confidential.

2. What is symmetric encryption technology?

Symmetric encryption adopts symmetric encryption technology, which features the same key for file encryption and decryption applications, that is, the encryption key can also be used as the decryption key, this method is called symmetric encryption algorithm in cryptography. The symmetric encryption algorithm is simple and quick to use, has a short key, and deciphering is difficult. Besides the Data Encryption Standard (DES ), another symmetric key encryption system is the International Data Encryption Algorithm (IDEA), which is better than the DNS encryption, and the function of the computer is not so high. IDEA encryption standards are used by the PGP (PrettyGoodPrivacy) system. encryption software source code encryption folder Encryption

3. What is the symmetric encryption technology?

In 1976, US scholars Dime and Henman proposed a new key exchange agreement to solve the problems of public information transfer and key management, allowing communication Parties to exchange information on insecure media, securely reach an agreement on the key, which is the "public key system ". this method is also called symmetric encryption algorithm ". unlike symmetric encryption algorithms, asymmetric encryption algorithms require two keys: public key and private key ).

The public key and private key are a pair. If the public key is used to encrypt the data, only the corresponding private key is used for decryption. If the private key is used to encrypt the data, only the corresponding public key can be used for decryption. since encryption and decryption use two different keys, this algorithm is called asymmetric encryption algorithm.

The basic knowledge of encryption technology for everyone to present the above, this site also has a lot of related security technology description, hope readers attention: http://netsecurity.51cto.com/

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.