Friday, June 14, 2019

Differentiate between the different types of cryptographic algorithms Essay

Differentiate between the different types of cryptographic algorithms - Essay ExampleThese are cloistered tombstone cryptography, public disclose cryptography and hash functions (Schneier, 2007).First, secret key algorithms are also known as symmetric key algorithms. The major feature of symmetric algorithms is the single key for encryption and decryption. This means that, the transmitter of the information uses a particular key to encrypt the plain text to goose egg text sent to the recipient role. After receiving information in the form of cipher text, the recipient uses the same key to decrypt the received message (Kessler, 2014). The single key employ must be known to both sender and receiver of the message only. Therefore, the message sent is secret and only accessible by either sender or receiver.The second cryptographic algorithms are the public key cryptography. It is also known as asymmetric key cryptography. Public key cryptography involves two related keys although knowledge of one key cannot be used in determining the other key. The sender of the message uses one key to encrypt the plain text while the receiver uses another different key to decrypt the message. The public key can be revealed publicly while only the message owner uses the private key (Kessler, 2014).Lastly, in Hash functions, a computed based hash value of a fixed length is used upon a plain text making it secure and unrecoverable. In most cases, sharp algorithms provide a digital fingerprint of files to ensure that no alteration occur on the file. In addition, hash functions are used to encrypt passwords in many operating systems (Schneier,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.