前往小程序,Get更优阅读体验!
立即前往
首页
学习
活动
专区
工具
TVP
发布
社区首页 >专栏 >CISSP考试指南笔记:3.14 加密的方法

CISSP考试指南笔记:3.14 加密的方法

作者头像
血狼debugeeker
发布2021-01-29 10:32:38
3240
发布2021-01-29 10:32:38
举报
文章被收录于专栏:debugeeker的专栏

Symmetric vs. Asymmetric Algorithms


Cryptography algorithms are either symmetric algorithms, which use symmetric keys (also called secret keys), or asymmetric algorithms, which use asymmetric keys (also called public and private keys).

Symmetric Cryptography


In a cryptosystem that uses symmetric cryptography, the sender and receiver use two instances of the same key for encryption and decryption. So the key has dual functionality, in that it can carry out both encryption and decryption processes. Symmetric keys are also called secret keys, because this type of encryption relies on each user to keep the key a secret and properly protected.

The following list outlines the strengths and weakness of symmetric key systems:

Strengths:

  • Much faster (less computationally intensive) than asymmetric systems.
  • Hard to break if using a large key size.

Weaknesses:

  • Requires a secure mechanism to deliver keys properly.
  • Each pair of users needs a unique key, so as the number of individuals increases, so does the number of keys, possibly making key management overwhelming.
  • Provides confidentiality but not authenticity or nonrepudiation.
本文参与 腾讯云自媒体同步曝光计划,分享自作者个人站点/博客。
原始发表:2021/01/23 ,如有侵权请联系 cloudcommunity@tencent.com 删除

本文分享自 作者个人站点/博客 前往查看

如有侵权,请联系 cloudcommunity@tencent.com 删除。

本文参与 腾讯云自媒体同步曝光计划  ,欢迎热爱写作的你一起参与!

评论
登录后参与评论
0 条评论
热度
最新
推荐阅读
目录
  • Symmetric vs. Asymmetric Algorithms
  • Symmetric Cryptography
领券
问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档