Hybrid Encryption

Hybrid Encryption

Hybrid Encryption


is a cryptographic approach that combines the benefits of both symmetric and asymmetric encryption.


- Symmetric: the same secret key is used for both encryption and decryption.??

- Asymmetric: uses a pair of keys; public (encrypt) and private (decrypt).??

- Common steps:??

- 1. The sender obtains the recipient's public key (ex: Browser from a web server).??

- 2. A random and temporary symmetric key is generated by the sender (to encrypt the data).??

- 3. The sender encrypts the data with the symmetric key.??

- 4. The symmetric key is encrypted with the recipient's public key.??

- 5. The encrypted data and the encrypted symmetric key are sent to the recipient.??

- 6. The recipient decrypts the symmetric key using their private key and uses it to decrypt the data.??

- Examples: SSL/TLS (HTTPS), PGP, SSH, IPsec, S/MIME

要查看或添加评论,请登录

José Cruz的更多文章

  • SaaS: Software as a Service

    SaaS: Software as a Service

    - A SaaS vendor hosts the service or the software. - The vendor provides a license or subscription model.

  • X-aaS – how many

    X-aaS – how many

    SaaS - Software as a Service PaaS - Platform as a Service IaaS - Infrastructure as a Service AaaS - Analytics as a…

  • What is an Architecture Style

    What is an Architecture Style

    Architecture Style is the same as an Architecture Pattern. It gives a name to the way the components and their…

  • IAST

    IAST

    IAST - Interactive Application Security Testing identifies security vulnerabilities in application code while it’s…

  • Dynamic Application Security Testing (DAST)

    Dynamic Application Security Testing (DAST)

    is a testing process to assess an application's security weaknesses and vulnerabilities. - Performs a black-box testing.

  • SAST

    SAST

    is a method used to review the source code of an application to identify potential vulnerabilities. - It is commonly…

  • BASE Transactions

    BASE Transactions

    is a transaction model often used on databases that rely heavily on horizontal scaling and performance. - BA: Basic…

  • ACID

    ACID

    is an acronym used in databases to describe the properties associated with the input-output operations on the data. -…

  • Coarse-grained vs. fine-grained

    Coarse-grained vs. fine-grained

    In computing, these concepts refer to the level of detail at which a system, configurations, security management, and…

  • RAG - Retrieval Augmentation Generation

    RAG - Retrieval Augmentation Generation

    RAG - Retrieval Augmentation Generation is a combination of Retrieval Augmentation and Generation to improve natural…

    1 条评论

社区洞察

其他会员也浏览了