Reply To: OCU C)OST B Discussion Lesson 05
There is many different types but the most common ones are Symmetric which is also know for a hidden key or a secret key Encryption this is mostly used for mobile devices some uses it on computers. The purpose for this is so that if you’re in somewhere and people are trying to get ur passwords or pull up messages they won’t be able to because symmetric is between your device and the device you are connected to.
Asymmetric Encryption it is nothing like Symmetric that uses one key. Asymmetric uses different keys to lock the passage into another device. That way only the key hold and the one other person can pull and perform actions and have the access to the advancement of functions it’s a lot like the RSA and ECC.
Hashing is a unique identifier, and it transforms data size and length that is fixed to an output known as hash value. it processes though a complex procedure and produces a distinct output for input data.