CISSP algorithms

Posted filed under CISSP.

Asymmetric Systems

–Uses a pair of keys (private and public) for encryption and decryption

–Built upon hard-to-resolve mathematical problem using factorization, discreet  logarithms, and the elliptic curve theory.

–Slower than symmetric algorithm.

 

[bs_icon name=”glyphicon glyphicon-chevron-right”]  Types of Asymmetric Systems

  • The Diffie-Hellman Algorithm
  • RSA
  • El Gamal
  • Elliptic Curve Cryptosystems
  • LUC
  • Knapsack
  • Zero Knowledge Proof

[bs_icon name=”glyphicon glyphicon-chevron-right”]  Symmetric Systems

–Uses a shared secret key for encryption and decryption

–Based on mathematical transposition and substitution functions

–Faster than asymmetric and hard to break.

–Examples below:

  • Data Encryption Standard (DES)
  • Triple-DES
  • Advance Encryption Standard (AES)
  • International Data Encryption Algorithm (IDEA)
  • Blowfish
  • RC4
  • RC5
  • RC6

Source by wikipedia

 

 To Become Cretified For CISSP Please Visit This Link ;

 

 

Comments are closed.