Difference between revisions of "Cryptography"
		
		
		
		
		
		Jump to navigation
		Jump to search
		
				
		
		
	
 (Created page with "= Encryption protocols = {| class="wikitable" |+ Encryption algorythms |- ! Symmetric ! Asymmetric |- |  * DES * 3DES * AES |  * DH (Diffie-Helman) * RSA * ECC (Elliptic-curve...")  | 
				|||
| Line 30: | Line 30: | ||
#Note, where needed the public key exchange happen, eg. via CA distribution process or protocol initialisation etc.  | #Note, where needed the public key exchange happen, eg. via CA distribution process or protocol initialisation etc.  | ||
</source>  | </source>  | ||
;Signing: if you sign anything with private key, the only way to verify the signature is to decrypt with the matching public key.  | |||
Revision as of 11:55, 20 July 2019
Encryption protocols
| Symmetric | Asymmetric | 
|---|---|
  | 
  | 
.     System-1                        System-2
#Encryption decryption
                      download
 [data encrypted]       ----->      [data decrypted]
- with public2 key                 - with private2 key
#Signing
 [data encrypted]       ----->      [data decrypted]
- with public2 key                 - with private2 key
- signed with private1 key         - verified signature with public1 key
#Note, where needed the public key exchange happen, eg. via CA distribution process or protocol initialisation etc.
- Signing
 - if you sign anything with private key, the only way to verify the signature is to decrypt with the matching public key.