RSA algorithm is the first algorithm that can be used for both encryption and digital signature, and it is also easy to understand and operate. RSA algorithm is an asymmetric encryption algorithm. The so-called asymmetry means that the algorithm needs a pair of keys. If one is used for encryption and the other is used for decryption.
2. ECC encryption password
ECC algorithm is also an algorithm that can be used for encryption and digital signature at the same time, and it is also easy to understand and operate. Like RSA algorithm, asymmetric cryptographic algorithm uses one encryption and the other decryption.
3. Password of both parties
Two-party ciphers use fewer matrices than four-party ciphers.
4. Four-way password
The tetragonal cipher is encrypted with four 5×5 matrices. Each matrix has 25 letters (usually Q will be cancelled or I and J will be regarded as the same, or a 6×6 matrix will be improved and 10 numbers will be added).
5. Three-point password
First, randomly create a 3×3 Polybius grid replacement password, including 26 English letters and a symbol. Then write the three-dimensional coordinates of the message to be encrypted. The message and coordinates are arranged in four columns, and then the horizontal number and the three numbers are grouped in sequence. Take these three numbers as coordinates, find the corresponding letters and get the ciphertext.
6.affine password
Affine password is an alternative password. It's letter to letter
7.Etbash code
Etbash code is a system: the last letter represents the first letter, and the penultimate letter represents the second letter.
8, fence encryption password
Fence encryption is a relatively simple and fast encryption method. The fence encryption method is to write the files to be encrypted one by one, and then arrange the words in the second line after the first line.
9. Pinhole encryption password
This encryption method was born in modern times. Because the postage was very expensive at that time, it cost very little to send newspapers. So people put a hole under the words needed in the newspaper with a needle, and when it is sent to the recipient, the recipient arranges the words with holes in turn to form an article.
10, wheel encryption password
A multi-code encryption method uses a plurality of rotating wheels, and each rotating wheel realizes single-code encryption. After each letter is encrypted, these rotating wheels can be combined to produce a new replacement pattern.
Baidu encyclopedia-password