How are types of Cryptography combined in our daily activities?
Nowadays, we spend much time on the Internet for reading news, watching videos, or surfing social networks. But have you ever stopped to consider that Cryptography is continuously protecting our information behind the scenes?
This article will explore three pillars of modern cryptography — symmetric encryption, asymmetric encryption, and hash functions—and see how they work together to keep our data secure.
Symmetric Key
Symmetric Key is the modern improvement of classical cipher encryption. The major challenge is safely distributing the secret key to all intended recipients.
Asymmetric Key
Asymmetric encryption addresses the key-sharing problem by introducing a mathematically linked pair of keys: public and private. However, that leads to high computation costs.
Use case
Hash Functions
Hash functions don’t encrypt data. They transform data into a fingerprint that reveals if the data has changed.
领英推荐
Use case
Hybrid cryptography
Many real-world systems combine types of encryption to leverage their advantages.
HTTPS / TLS
Digital Signatures
References: