Discuz! Board

 找回密碼
 立即註冊
搜索
熱搜: 活動 交友 discuz
查看: 5|回復: 0
打印 上一主題 下一主題

ASYMMETRICAL ENCRYPTION

[複製鏈接]

1

主題

1

帖子

2

積分

新手上路

Rank: 1

積分
2
跳轉到指定樓層
樓主
發表於 2024-11-7 17:44:46 | 只看該作者 回帖獎勵 |倒序瀏覽 |閱讀模式
Asymmetric encryption, or public-key cryptography, is a cryptographic system that uses public and private keys to encrypt and decrypt data. The public and private keys are very large numbers that are related to each other by a specific function, but in such a way that knowing one makes it extremely difficult to calculate the other.

The public key is transmitted via unprotected communication channels and is known to everyone. The public key is used to encrypt data and verify  the electronic signature of documents  (EDS).

A private key is used to decrypt the data, which is kept secret. Thus, the main advantage of asymmetric encryption over symmetric encryption is the ability of the parties to communicate and exchange data with each other without using secret communication channels.

The reliability of encryption (cryptographic strength) depends on the length of the key and increases exponentially as the key length doubles.

Asymmetric encryption is used in various protocols such as SSH, OpenPGP, S/MIME, and SSL/TLS, as well as in various systems that require establishing a secure connection over an unsecured network or verifying a digital signature.

The most common asymmetric encryption virtual phone number service algorithm is RSA, used in the SSL/TLS protocol and applied for both encryption and digital signature. The algorithm is based on the computational complexity of the problem of factoring large integers. The length of the RSA key is theoretically unlimited, but is usually between 1024 and 8192 bits.


Share
More useful materials from experts and the latest news from Indid Company in our telegram channel
Join
Read more on the topic
16.09.2024
Events
Identity Conf 2024 — the first conference in Russia on the topic of Identity security
Registration for Identity Conf 2024, which will take place on October 31 in the Cyberdom space in Moscow, is now open. The conference will be held for the first time and will become an annual event and a center of attraction for expertise in the field of […]



Read more
14.05.2024
Indeed Privileged Access Manager
Indeed Privileged Access Manager (Indeed PAM) Update: Version 2.10
Indeed is pleased to announce version 2.10 of Indeed Privileged Access Manager (Indeed PAM). Indeed PAM now supports OpenLDAP and ALD PRO directory services in addition to Active Directory and FreeIPA. In […]

Read more
07.11.2022
Glossary
CRYPTOGRAPHIC KEY
A cryptographic key is a string of bits used by cryptographic algorithms to encrypt and decrypt data and verify an electronic signature. Accordingly, a cryptographic key is used to perform cryptographic […]

Read more
02.11.2022
Glossary
PRIVATE KEY
In asymmetric encryption, different keys are used to convert data back and forth, called a key pair. The public and private keys are very large numbers that are related to each other […]

Read more
10/31/2022
Glossary
OPEN KEY
In asymmetric encryption systems (public key cryptographic systems), a public key is used to encrypt data and verify the electronic signature of documents and data. The peculiarity of a public key is that.

回復

使用道具 舉報

您需要登錄後才可以回帖 登錄 | 立即註冊

本版積分規則

Archiver|手機版|自動贊助|GameHost抗攻擊論壇  

GMT+8, 2025-2-7 09:58 , Processed in 0.204914 second(s), 5 queries , File On.

抗攻擊 by GameHost X3.3

© 2001-2017 Comsenz Inc.

快速回復 返回頂部 返回列表
一粒米 | 中興米 | 論壇美工 | 設計 抗ddos | 天堂私服 | ddos | ddos | 防ddos | 防禦ddos | 防ddos主機 | 天堂美工 | 設計 防ddos主機 | 抗ddos主機 | 抗ddos | 抗ddos主機 | 抗攻擊論壇 | 天堂自動贊助 | 免費論壇 | 天堂私服 | 天堂123 | 台南清潔 | 天堂 | 天堂私服 | 免費論壇申請 | 抗ddos | 虛擬主機 | 實體主機 | vps | 網域註冊 | 抗攻擊遊戲主機 | ddos |