Today we’re going to talk about What are the main 3 types of Cryptography Algorithms?
The cryptographic protection of a system against attacks and malicious penetration depends on two dimensions
1.The strength of the keys and the effectiveness of mechanisms and protocols associated with the keys
2.the protection of the keys through key management.
Strong algorithms combined with poor key management are as likely to fail as poor algorithms embedded in a strong key management context.
1.Narrowing the Pool of Algorithms
These algorithms have undergone extensive security analysis and are continually tested to ensure that they provide adequate security. Cryptographic algorithms will usually use cryptographic keys and when these algorithms need to be strengthened, it can often be done by using larger keys.
2.Classes of Cryptographic Algorithms
which are defined by the number or types of cryptographic keys that are used with each.
A cryptographic hash function does not use keys for its basic operation. This function creates a small digest or “hash value” from often large amounts of data through a one way process. Hash functions are generally used to create the building blocks that are used in key management and provide security services such as
- Providing source and integrity authentication services by generating message authentication codes (MACs)
- Compressing messages for generating and verifying digital signatures
- Deriving keys in key establishment algorithms
- Generating deterministic random numbers
2.Symmetric key algorithms
Also referred to as a secret key algorithm, a symmetric key algorithm transforms data to make it extremely difficult to view without possessing a secret key.
The key is considered symmetric because it is used for both encrypting and decrypting. These keys are usually known by one or more authorized entities. Symmetric key algorithms are used for
Providing data confidentiality by using the same key for encrypting and decrypting data.
Providing Message Authentication Codes (MACS) for source and integrity authentication services. The key is used to create the MAC and then to validate it.
- Establishing keys during key establishment processes
- Generating deterministic
- random numbers
3.Asymmetric key algorithms
Also referred to as public-key algorithms, asymmetric key algorithms use paired keys in performing their function. The public key is known to all, but the private key is controlled solely by the owner of that key pair. The private key cannot be mathematically calculated through the use of the public key even though they are cryptographically related. Asymmetric algorithms are used for
- ་ Computing digital signatures
- Establishing cryptographic keying material
- Identity Management