There are two basic forms of encryption are symmetric and asymmetric cryptography. In symmetric encryption, the...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
same special "key" is used to encrypt and decrypt the data. In asymmetric encryption there are two keys, the public key and the private key, that are used by the sender and receiver.
Examples of symmetrical encryption include DES (data encryption standard), Triple DES, and the Rijndael Cipher (pronounced rain-del). Examples of asymmetrical encryption include RSA, Diffie-Hellman, and El Gamal. A good reference book for encryption technologies is "Applied Cryptography" by Bruce Schneier.
Dig Deeper on Network intrusion detection and prevention and malware removal
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.