.

Wednesday, May 1, 2019

Differentiate between the different types of cryptographic algorithms Essay

Differentiate between the different types of cryptographic algorithms - Essay recitationThese atomic number 18 secret mainstay cryptography, existence anchor cryptography and hash functions (Schneier, 2007).First, secret describe algorithms be also know as symmetric key algorithms. The major feature of symmetric algorithms is the single key for encryption and decryption. This means that, the sender of the information uses a particular key to encrypt the plain schoolbook to cipher text sent to the receiver. After receiving information in the form of cipher text, the recipient uses the similar key to decrypt the received message (Kessler, 2014). The single key utilise must be cognize to both sender and receiver of the message only. Therefore, the message sent is secret and only accessible by either sender or receiver.The second cryptographic algorithms are the public key cryptography. It is also known as asymmetric key cryptography. Public key cryptography involves two relat ed keys although knowledge of adept key cannot be used in determining the other key. The sender of the message uses one key to encrypt the plain text while the receiver uses another different key to decrypt the message. The public key can be revealed publicly while only the message owner uses the private key (Kessler, 2014).Lastly, in Hash functions, a computed based hash value of a fixed length is used upon a plain text making it secure and unrecoverable. In most cases, harsh algorithms provide a digital fingerprint of files to ensure that no alteration occur on the file. In addition, hash functions are used to encrypt passwords in many operating systems (Schneier,

No comments:

Post a Comment