Current location - Quotes Website - Personality signature - It does not belong to symmetric encryption algorithm.
It does not belong to symmetric encryption algorithm.
There are RSA algorithm, elliptic curve cryptography, digital signature algorithm, hash function and random number generation algorithm that do not belong to symmetric encryption algorithm.

1, RSA algorithm

RSA is one of the most common public key encryption algorithms, which uses a pair of keys for encryption and decryption. One key is a public key, which can be used to disclose encrypted data, and the other key is a private key, which can be used to decrypt data. Because the public key and the private key are different, it is not a symmetric encryption algorithm.

2. Elliptic curve encryption

Elliptic curve cryptography is a public key encryption algorithm based on elliptic curve mathematics, which uses a pair of keys to encrypt and decrypt. One key is a public key, which can be used to disclose encrypted data, and the other key is a private key, which can be used to decrypt data. Because the public key and the private key are different, it is not a symmetric encryption algorithm.

3. Digital signature algorithm

Digital signature algorithm is used to verify the integrity and authenticity of data and the identity of the data sender. They use a pair of keys, a private key and a public key to sign and verify. The private key is used to sign the data and the public key is used to verify the signature. Because they use a pair of keys, they are also asymmetric encryption algorithms.

4. Hash function

Hash function is a method to convert data of arbitrary length into hash value of fixed length, which is usually used for password storage and data integrity verification. Because the hash function can only calculate the hash value from the input data, but cannot recover the original input data from the hash value, it is not a symmetric encryption algorithm.

5. Random number generation algorithm

Random number generation algorithm is used to generate random numbers, which can be used to generate keys in encryption algorithm. Because the random number generation algorithm only generates random numbers without decryption or decryption, it is not a symmetric encryption algorithm.