2009年4月9日星期四

Hybrid Encryption Methods

symmetric algorithms are fast but have some drawbacks( lacks of scalability, difficult key management, and they provide only confidentiality).
Asymmetric algorithms do not have these drawbacks but are very slow. we just can't seem to min.
so we turn to a hybird system that uses symmetric and asymmetric encryption methods together.

then there is a hybird use of the two different algorithms: asymmetric and symmetric. Each algorithm has its pros and cons, so using them together can be the best of both worlds.

In the hybrid approach , the two technologies are used in a complementary manner, with each performing a different function.
A symmetric algorithm create keys used for encryption bulk data, and an asymmetric algorithm creates keys used for automated key distribution.

when a symmetric key is used for bulk data encryption, this key is used to encrypt the message you want to send.
So we use an asymmetric algorithm to encrypt the symmetric key,

In a hybrid system, the asymmetric key is used to encrypt the symmetric key, and the symmetric key is used to encrypt the message.

Just remember the following points:
. An asymmetric algorithm performs encryption and decryption by using pubic and private keys that are related to each other mathematically
. A symmetric algorithm performs encryption and decryption by using a symmetric key.
. A symmetric key is used to encrypt the actual message.
. public keys are used to encrypt the symmetric key for secure key exchange.
. A secret key is synonymous to a symmetric key.
. An asymmetric key refers to a public or private key.

没有评论:

发表评论