Symmetric and Asymmetric Key Algorithms:
Before these protocols can
establish a secure communications tunnel (VPN) between two endpoints, they
generate, exchange, and use keys as a means to authenticate/encrypt the
information used to create a secure tunnel that is sent between both parties.
Symmetrical
Encryption:
One
key to encrypt as well as Decrypt
Symmetrical
Encryption Algorithm:
DES Digital Encryption Standard 56bit
3DES Triple DES 168bit
AES Advance Encryption Standard 128 , 192 , 256
bit
IDEA International Data Encryption Algorithm
Asymmetric
Encryption:
One
key to encrypt and second key to decrypt, one key is called private key which
is keep private and the second key is called as public key which is
distributed. The data encrypted by the public key can only be decrypted by the
private key and vice-versa. when we need to create session for any bank
transaction we use Asymmetrical encryption as its heavy and secure whereas when
we need to do file transfer or any data transfer we use symmetrical encryption.
Public/private
key pairs commonly use digital certificates as a method of key distribution.
Internet shopping and other sites often use SSL/TLS as a way to secure
transactions on their websites. In this case, you usually receive a copy of the
server’s digital certificate. Within the certificate is a copy of the server’s
public key. By using this public key, the host and server can set up a secure
communications path (because the server has a corresponding private key).
Examples of asymmetric key algorithms include the following:
Rivest,
Shamir, and Adleman (RSA)
Diffie-Hellman (DH)
No comments:
Post a Comment