SEC4

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Symmetric-key Both the sender and the recipient must use the same key in order to decode the

message when
using cryptography. The sender will use this key to encrypt the plaintext, and then they will send the cipher text
to the receiver. The recipient will then decipher the message. When the communication is decrypted on the
receiving end, the plain text may be recovered by the receiver by using the same key that was used throughout
the encryption process.

It is generally agreed upon that the conception of public-key cryptography represents the most significant step
forward in technological development that has occurred in the previous three hundred to four hundred years.
Two different keys, one known as the public key and the other as the private key, are used in the process of
public-key cryptography. It is permissible to broadcast the public key extensively; however, the private key that
is associated with it must be guarded carefully. The public key is used to carry out the process of encryption,
while the private key is required for the decryption process.

Hash Functions: In this particular method, the use of a key is not required in any way. A value that cannot be
recovered is produced when a fixed-length hash value is calculated based on the plain text. This prevents the
contents of the plain text from being rebuilt. Hash functions are used as an extra technique of password
encryption by a number of different operating systems.

You might also like