1.Symmetric Key Cryptography (Secret Key Cryptography)
2.Asymmetric Key Cryptography (Public Key Cryptography)
3. HASH FUNCTION
1.Symmetric Key Cryptography (Secret Key Cryptography)
a).Same Key is used by both parties
a).Same Key is used by both parties
b). Simpler and Faster
2.Asymmetric Key Cryptography (Public Key Cryptography)
a).Two different keys are used Users get the Key from an Certificate Authority.
b). Authentication in asymmetric cryptography is more secured but the process is relatively more complex as the certificate has to be obtained from certification authority.
3. HASH FUNCTION:
a).Uses mathematical transformation to irreversibly encrypt information.
a).Uses mathematical transformation to irreversibly encrypt information.
b).It is a one-way encryption
c).uses no key for encryption and decryption
No comments:
Post a Comment