Академический Документы
Профессиональный Документы
Культура Документы
NY 0215
called plaintext. The encrypted (scrambled) data is called cipher text. An encryption algorithm, or cipher, is a set of steps that
can convert readable plaintext into unreadable cipher text.
Encryption programs typically use more than one encryption algorithm, along with an encryption key.
Encryption Key
An encryption key is a set of characters that the originator of the data uses to encrypt the plaintext and the recipient of the
data uses to decrypt the cipher text. Two basic types of encryption are private key and public key.
Private Key Encryption
Private Key Encryption is also called symmetric key encryption. The same secret key is used by both the originator and the
recipient to encrypt and decrypt the data.
Public Key Encryption
Public Key Encryption is also called asymmetric key encryption. It uses two encryption keys: a public key and a private key.
Public key encryption software generates both the private key and the public key. A message encrypted with a public key can
be decrypted only with the corresponding private key, and vice versa. The public key is made known to message originators
and recipients. For example, public keys may be posted on a secure Web page or a public-key server, or they may be emailed. The private key must always be kept confidential. Usually extremely efficient, requiring simple processing to encrypt
or decrypt the message
Main challenge is getting a copy of the key to the receiver, a process that must be conducted out-of-band to avoid
interception
There is also a third encryption key called a Hybrid key.
Hybrid Key Encryption
Hybrid Key Encryption is a combination of symmetric and asymmetric encryption keys. For key distribution, symmetric is used
and when encrypting and decrypting the message, asymmetric is used.
Encryption as discussed above and as an element of cryptography is a methodology for achieving information security,
through secretive communications. Therefore, encryption is an information security tool.
REFERENCES: