Security and Hacking Notes

Encryption and Authentication DESCRIPTION Privacy protection using DES (symmetric algorithm) involves the use of two secret keys. Each party must share their secret key with others. This makes this sort of encryption difficult to use in web technologies. RSA public key encryption (asymmetric) solves this problem. RSA uses matched pairs of encryption and decryption keys. […]