Monday, December 1, 2014

7.2 - Methods of Encryption

There are several parts to an encryption process; however, it should be noted that there are two main pieces: algorithms and keys. Algorithms used in computer systems are complex mathematical formulas enforce rules of how the plaintext will be turned into cipher-text. Keys are strings of bits that use these algorithms and add randomness for encryption.

To allow entities to communicate through encryption, these entities must use the same algorithm and the same key. With some encryption technologies, the receiver and the sender have the same key to use (symmetric), and in other encryption technologies, they must use different related keys for encryption and decryption (asymmetric, public and private keys).



Example of symmetric encryption.

0 comments:

Post a Comment