Hybrid Algorithms
Usually asymmetric key systems ensure a good security level but are slower and computationally more demanding than symmetric key encryption. Hybrid Algorithms system uses a symmetric and an asymmetric public key system by combining the advantages of two systems: the safety of the public key and the speed of the symmetric key.
Specifically the hybrid system uses a public key algorithm, usually RSA, in order to safely share the symmetric encryption system's secret key. The real message is then encrypted using that key (usually DES because very fast) and then sent to the recipient.
Since the key sharing method is secure, the symmetric key used for the encryption changes for each message sent. For this reason it is sometimes called the session key. This means that if the session key was intercepted, the interceptor would only be able to read the message encrypted with that key. In order to decrypt other messages the interceptor would have to intercept other session keys.
 
The session key, encrypted using the public key algorithm, and the message being sent, encrypted with the symmetric algorithm, are automatically combined into a single package. The recipient uses his private key to decrypt the session key and then uses the session key to decrypt the message. Many applications use this system, the most popular are the PGP and GnuPG.
 
Hybrid AlgorithmsUsually asymmetric key systems ensure a good security level but are slower and computationally more demanding than symmetric key encryption. Hybrid Algorithms system uses a symmetric and an asymmetric public key system by combining the advantages of two systems: the safety of the public key and the speed of the symmetric key.Specifically the hybrid system uses a public key algorithm, usually RSA, in order to safely share the symmetric encryption system's secret key. The real message is then encrypted using that key (usually DES because very fast) and then sent to the recipient.Since the key sharing method is secure, the symmetric key used for the encryption changes for each message sent. For this reason it is sometimes called the session key. This means that if the session key was intercepted, the interceptor would only be able to read the message encrypted with that key. In order to decrypt other messages the interceptor would have to intercept other session keys. The session key, encrypted using the public key algorithm, and the message being sent, encrypted with the symmetric algorithm, are automatically combined into a single package. The recipient uses his private key to decrypt the session key and then uses the session key to decrypt the message. Many applications use this system, the most popular are the PGP and GnuPG.
การแปล กรุณารอสักครู่..
