CISSP Asymmetric Systems
Asymmetric Systems
–Uses a pair of keys (private and public) for encryption and decryption
–Built upon hard-to-resolve mathematical problem using factorization, discreet logarithms, and the elliptic curve theory.
–Slower than symmetric algorithm.
[bs_icon name=”glyphicon glyphicon-chevron-right”] Types of Asymmetric Systems
- The Diffie-Hellman Algorithm
- RSA
- El Gamal
- Elliptic Curve Cryptosystems
- LUC
- Knapsack
- Zero Knowledge Proof
[bs_icon name=”glyphicon glyphicon-chevron-right”] Symmetric Systems
–Uses a shared secret key for encryption and decryption
–Based on mathematical transposition and substitution functions
–Faster than asymmetric and hard to break.
–Examples below:
- Data Encryption Standard (DES)
- Triple-DES
- Advance Encryption Standard (AES)
- International Data Encryption Algorithm (IDEA)
- Blowfish
- RC4
- RC5
- RC6
Source by wikipedia
To Become Cretified For CISSP Please Visit This Link ;