Current location - Quotes Website - Signature design - What kinds of keys are there, what are their uses and manufacturing techniques, and how to evaluate their performance?
What kinds of keys are there, what are their uses and manufacturing techniques, and how to evaluate their performance?
Public key encryption and private key decryption (explained in detail below, there are many contents) use public key encryption when encrypting plaintext and private key when decrypting ciphertext. Moreover, the sender (encryptor) knows the public key of the receiver, and only the receiver (decryptor) knows its own private key. The basic principle of asymmetric encryption algorithm is that if the sender wants to send encrypted information that only the receiver can read, the sender must first know the public key of the receiver, and then encrypt the original text with the public key of the receiver; After receiving the encrypted ciphertext, the receiver can only decrypt the ciphertext with his own private key. Obviously, using asymmetric encryption algorithm, before the sender and the receiver communicate, the receiver must send the public key randomly generated by itself to the sender, while the private key is kept by itself. Because asymmetric algorithm has two keys, it is especially suitable for data encryption in distributed systems. The widely used asymmetric encryption algorithms include RSA algorithm and DSA algorithm proposed by American National Bureau of Standards. Encryption technology based on asymmetric encryption algorithm is widely used. Please visit the following website /show_hdr.php for details of their production process and performance evaluation. xname = PPDDMV0 & ampdname = cb7t 44 1 & amp; xpos= 1 19