1, RSA algorithm
RSA is one of the most common public key encryption algorithms, which uses a pair of keys for encryption and decryption. One key is a public key, which can be used to disclose encrypted data, and the other key is a private key, which can be used to decrypt data. Because the public key and the private key are different, it is not a symmetric encryption algorithm.
2. Elliptic curve encryption
Elliptic curve cryptography is a public key encryption algorithm based on elliptic curve mathematics, which uses a pair of keys to encrypt and decrypt. One key is a public key, which can be used to disclose encrypted data, and the other key is a private key, which can be used to decrypt data. Because the public key and the private key are different, it is not a symmetric encryption algorithm.
3. Digital signature algorithm
Digital signature algorithm is used to verify the integrity and authenticity of data and the identity of the data sender. They use a pair of keys, a private key and a public key to sign and verify. The private key is used to sign the data and the public key is used to verify the signature. Because they use a pair of keys, they are also asymmetric encryption algorithms.
4. Hash function
Hash function is a method to convert data of arbitrary length into hash value of fixed length, which is usually used for password storage and data integrity verification. Because the hash function can only calculate the hash value from the input data, but cannot recover the original input data from the hash value, it is not a symmetric encryption algorithm.
5. Random number generation algorithm
Random number generation algorithm is used to generate random numbers, which can be used to generate keys in encryption algorithm. Because the random number generation algorithm only generates random numbers without decryption or decryption, it is not a symmetric encryption algorithm.