There are two basic forms of encryption are symmetric and asymmetric cryptography. In symmetric encryption, the...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
same special "key" is used to encrypt and decrypt the data. In asymmetric encryption there are two keys, the public key and the private key, that are used by the sender and receiver.
Examples of symmetrical encryption include DES (data encryption standard), Triple DES, and the Rijndael Cipher (pronounced rain-del). Examples of asymmetrical encryption include RSA, Diffie-Hellman, and El Gamal. A good reference book for encryption technologies is "Applied Cryptography" by Bruce Schneier.
Dig Deeper on Network intrusion detection and prevention and malware removal
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.