Symmetric and Asymmetric Key Cryptography


0
Symmetric and Asymmetric Key Cryptography



#Symmetric #Asymmetric #Key #Cryptography

Symmetric and asymmetric key cryptography will be the topic in this session key Prague Rafi algorithms ciphers can be categorized mainly into two heads one is the symmetric key or secret key cryptography algorithms another one is the asymmetry key or public key cryptography algorithms so that means cryptography has got

Categorized in two different categories one is a symmetric key which is dealing with secret key and another one is a symmetric key which is dealing with the public key here one same key is used by the sender for encryption and also by the receiver for decryption so in case

Of symmetric key cryptography we know that we will be requiring the secret key here and so here one same key is used by the sender for encryption and also the same key will be used by the receiver for the decryption process so the key is shared you can find this one so here

This is let us suppose he is ascended and he is a receiver so the same key that is a shared secret key will be shared for both encryption and also for decryption and here through the media ciphertext will be sent and this is our symmetric key cryptography the basic

Idea in case of a symmetric key cryptography there are two keys are there in a symmetric or public key cryptography one key is a private key used by the receiver and another one is a public key which is announced to the public so two keys are there you can find here

CSE we’re having these Bob’s public key so these are Bob’s public key and this public key is available to all the public for this encryption also using the Bob’s public key it will be encrypted the plaintext will be there which has been sent by Alice and this particular plaintext is getting

Interpreted by the Bob’s public key now it is getting a transferred through the ciphered ciphertext in the form and then at the decryption Bob’s private key will be used for the decryption and then plaintext will be originated so this is known as a symmetric key cryptography I

Think you are getting me that was using the Bob’s public key which is known to the public and that pops public you will be used for the encryption purpose so Elise is a respective sender of the plaintext using Bob’s public key it will be encrypted so the ciphertext will be originated and

Then it will get degraded by the decrypted by the Bob’s private key and the plaintext will be ryojun ate it so what is happening you see so there are three types of keys I’m just going for the summary there are three types of keys one is the secret key there is a

Shear key for sender and the receiver which is being used in case of symmetric key cryptography and another two keys are there that is a private key used by the receiver and public key which is announced to the public and this is a private public key and private key so

They’ll be used in the asymmetric key cryptography I think you are getting this idea thanks for watching this tutorial point.com simply easy learning


Like it? Share with your friends!

0

What's Your Reaction?

hate hate
0
hate
confused confused
0
confused
fail fail
0
fail
fun fun
0
fun
geeky geeky
0
geeky
love love
0
love
lol lol
0
lol
omg omg
0
omg
win win
0
win
GuestGram

0 Comments

Choose A Format
Poll
Voting to make decisions or determine opinions
Story
Formatted Text with Embeds and Visuals
Video
Youtube and Vimeo Embeds
Audio
Soundcloud or Mixcloud Embeds
Image
Photo or GIF
Gif
GIF format