The difference between the two forms of encryption:The difference between the two forms of encryption. Symmetric encryption Data encryption and decryption faster, but first there must be an OK key together with the key exchange problem is not secure. Automate the symmetric encryption The key exchange is no problem, because the public key. It is not a secret, but the algorithm to encrypt and decrypt very slow time. Symmetric encryption If you want to keep in touch with the secret key must be used in groups of several keys, but the key is to use only public catalogues and the private key only. A public key system, you must take the time to calculate and decoder. Symmetric key system, versus and may take a thousand times the symmetric key that is used by the system time.The strength of the algorithm for encryption:The strength of the algorithm for encryption strength of the algorithm refers to the difficulty in which intruders can starve the identification information without the key used in the encryption that is based on the following factors. To store the encryption keys are confidential. The length of the encryption key, the higher the number the more key bit. A complete guess so random to find the correct key is going to be more difficult. A good algorithm must be open to scholars studying in detail, without fear that those studies will be able to handle the encoding format. A secret door in the algorithm A good algorithm must not be concealed by the secret door that can be used as an entrance to the algorithm. Further, the problem is not afraid to find relationships in data that has been.Algorithms for public key encryption:Algorithms for public key encryption A public key algorithm Hotels by features available as two categories used for encryption. Use for electronicRSA algorithm:RSA algorithm RSA algorithm has been developed at MIT in 1977 by University Professor Ronald Rivest that consists of 3 people, Adi Shamir and Leonard Adleman, the name of the algorithm has been named by the first letter of the last name of the three men, Professor. This algorithm can be used to encrypt the data, including electronic sign.
การแปล กรุณารอสักครู่..