Key or symmetric key encryption

Source: Internet
Author: User

Comments: Secret-Key or Symmetric-Key Cryptography (Secret-Key or Symmetric Ric-Key Cryptography) is a network technology security technology that ensures information disclosure by restricted parties with decryption keys. In the key encryption mode, you only need to provide one key for encryption and decryption. It is also called symmetric key encryption. Asymmetric key encryption is mainly used to encrypt a key or symmetric key.
(Secret-Key or encryption Ric-Key Cryptography)
Key encryption is a network technology security technology that ensures that the restricted party has a message decryption key for information disclosure. In the key encryption mode, you only need to provide one key for encryption and decryption. It is also called symmetric key encryption. Asymmetric key encryption is mainly used in systems that require a set of public/private keys: one key is used for message encryption and the other key is used for decryption.
There are multiple formats of keys, such as codes, passwords, and others. The most popular key Encryption technology is the Data Encryption Standard (DES: Data Encryption Standard ). More and more advanced encryption algorithms are currently used: Triple DES, which supports the security of highly sensitive information. Key management is the core technology in key encryption, including key establishment, key storage, key distribution, and key cancellation. The financial industry is dominant in the Process of standardized key protection and exchange. The specific content is described in the ANSI X9.17 financial institution key management (Wholesale) standard. Currently, SKIP (Simple Key management for IP) and ISAKMP/Oakley are the most popular Key management technologies.
Public key encryption can be used to provide private information protection during information storage and exchange. If you want to keep the information confidential on your hard disk, you can use the key to keep it confidential. If you want to transmit the information to the other party, the key encryption technique ensures that the information is not readable even if it is captured by 3rd party, however, the recipient can successfully perform the decryption process by being notified in advance or jointly negotiating the key.
Each communication requires a key. This increases the difficulty of key management for large systems and makes it difficult for users to transmit network keys securely. Public key encryption is usually applied to information security mechanisms of large systems, while private key encryption is often applied to information security mechanisms of small systems.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.