Difference between revisions of "Cryptography"
Jump to navigation
Jump to search
(Created page with "= Encryption protocols = {| class="wikitable" |+ Encryption algorythms |- ! Symmetric ! Asymmetric |- | * DES * 3DES * AES | * DH (Diffie-Helman) * RSA * ECC (Elliptic-curve...") |
|||
Line 30: | Line 30: | ||
#Note, where needed the public key exchange happen, eg. via CA distribution process or protocol initialisation etc. | #Note, where needed the public key exchange happen, eg. via CA distribution process or protocol initialisation etc. | ||
</source> | </source> | ||
;Signing: if you sign anything with private key, the only way to verify the signature is to decrypt with the matching public key. |
Revision as of 12:55, 20 July 2019
Encryption protocols
Symmetric | Asymmetric |
---|---|
|
|
. System-1 System-2 #Encryption decryption download [data encrypted] -----> [data decrypted] - with public2 key - with private2 key #Signing [data encrypted] -----> [data decrypted] - with public2 key - with private2 key - signed with private1 key - verified signature with public1 key #Note, where needed the public key exchange happen, eg. via CA distribution process or protocol initialisation etc.
- Signing
- if you sign anything with private key, the only way to verify the signature is to decrypt with the matching public key.