Current location - Quotes Website - Signature design - IOS asymmetric encryption algorithm
IOS asymmetric encryption algorithm
If the data is encrypted with the public key, it can only be decrypted with the corresponding private key.

If the data is encrypted with a private key, it can only be decrypted with the corresponding public key.

Encrypted signature: others encrypt information with your public key and send it to you, and you decrypt the information with your private key. On the other hand, you can also encrypt information with your private key, and others can decrypt it with your public key, thus proving that this information is indeed sent by you and has not been tampered with. This is called a digital signature.

What is a digital signature?

The strength of the algorithm is complex, and the security depends on the algorithm and key.

Encryption and decryption are slow.

Symmetric encryption has only one key and is not public. If you want to decrypt it, you have to let the other party know the key.

Asymmetric encryption has two kinds of keys, one of which is the public key.

Because the encryption and decryption speed of RSA algorithm is much slower than that of symmetric algorithm, RSA algorithm is usually used in practical application.

The data itself is encrypted and decrypted using the symmetric encryption algorithm (AES). Encrypt the key needed by the symmetric transmission algorithm with RSA algorithm.