Reply To: OCU C)OST B Discussion Lesson 05
There are three encryption methods: symmetric, Asymmetric, and Hashing. Symmetric encryption, also known as secret key Encryption, is a widely used method. It operates on the principle of using a single key to encrypt and decrypt data. This key is crucial for both processes as a random string of bits by a computer. Visualize the key as a specific set of instructions to create a secret language that transforms the original data. Replace each alphabet letter with another letter based on the key, and when you’re writing a message, you use this secret language to transform each letter according to the key. Asymmetric Encryption uses two keys, one for public encryption and the other for private encryption. Hashing Encryption is a unique process of transforming any data, regardless of size, to a unique output known as a hash value.
sealpath.com