Ecommerce Security  «Prev 

Types of encryption

1) In symmetric or private-key encryption, both parties to the communication most passes a single secret or private key, as show below.
In symmetric or private-key encryption, both parties to the communication most passes a single secret or private key, as show below.

2) Private-key encryption is a paradox: 1) to use this encryption, a secure channel has to exist between the two parties to transfer the shared key
Private-key encryption is a paradox: 1) to use this encryption, a secure channel has to exist between the two parties to transfer the shared key, but if such a secure channel exists, why are use encryption in the first place?

3) Asymmetric, or public-key encryption as it is more commonly called
Asymmetric, or public-key encryption as it is more commonly called, allows parties previously unknown to each other to conduct a transaction. Public key-encryption is fairly recent, and has only been in use since the mid 1980s.

Mastering Ethereum
4) The public key is published and widely disseminated, while the private key is kept secret.
The public key is published and widely disseminated, while the private key is kept secret.

5) Because communication decryption requires only public keys, which are widely available anyway
Because communication decryption requires only public keys, which are widely available anyway, secret keys need no longer be exchanged RSA is the de facto standard for public-key cryptosystems.

6) One-way encryption, as its name implies, is encryption that prevents the resulting cipher from being decrypted.
One-way encryption, as its name implies, is encryption that prevents the resulting cipher from being decrypted. A one-way function is relatively easy to compute in one direction, but very difficult ot computer in the other direction.

7) Historically these funcations have been used for storing items such as passwords on Windows and Unix systems
Historically these functions have been used for storing items such as passwords on Windows and Unix systems.