Rivest-Shamir-Adleman short form as RSA falls under the Asymmetric Encryption category. Now the basics are clear, let’s focus on the Rivest-Shamir-Adleman (RSA) algorithm in this post. If the sender and the recipient of the data use the same key to encrypt and decrypt the data, it’s called symmetric encryption and if the keys are different for encryption and decryption then it’s asymmetric encryption. The encrypted data, once received by the organization, is decrypted by using a private key and the data is converted to plaintext.Ĭryptography uses symmetric and asymmetric encryption for encryption and decryption of data. A public key is issued publicly by the organization and it is used by the end-user to encrypt the data. Cryptography makes use of public and private keys. A key is a bit-valued string that is used to convert the plaintext into ciphertext and vice-versa.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |