Types of Asymetric and Symetric Cryptography

los5011los5011 ■□□□□□□□□□ Posts: 7Member ■□□□□□□□□□
I would like to know what are types of asymetric and symetric cryptography?
I got the question from comptia practice test

RSA, 3DES, AES, DES, ECC, AES256

I would like to know what is defintion of each, and under which category they belong under. thank you

Comments

  • bighornsheepbighornsheep Posts: 1,506Member
    Symmetric encryption uses the same key for encrypting and decrypting. Examples are 3DES, AES, etc.

    Asymmetric encryption (also known as Public Keying) uses one key for encryption and a second key for decrypting. Examples are Diffie Hellman, RSA, etc.
    Jack of all trades, master of none
  • kriscamaro68kriscamaro68 A+, Net+, Server+, Security+, Win7 MCP, Server 2012 Virtualization Specialist, MCSA 2012 Posts: 1,186Member ■■■■■■■□□□
    los5011 wrote: »
    I would like to know what are types of asymetric and symetric cryptography?
    I got the question from comptia practice test

    RSA, 3DES, AES, DES, ECC, AES256

    I would like to know what is defintion of each, and under which category they belong under. thank you

    wikipedia is your friend.
  • yiannityiannit ■□□□□□□□□□ Posts: 27Member ■□□□□□□□□□
    los5011 wrote: »
    I would like to know what are types of asymetric and symetric cryptography?
    I got the question from comptia practice test

    RSA, 3DES, AES, DES, ECC, AES256

    I would like to know what is defintion of each, and under which category they belong under. thank you

    RSA( Rivest, Shamir, Adelman) used in VPN, Digital Certificates etc. and ECC used in mobile devices ( Eliptical Curve Cryptography) are asymmetric cryptography also DH(Diffie Hellman) used for symmetric key exchange in IKE phase 1 in VPNs

    DES (Data Encryption Standard), 3DES , AES, AES256 (Advances Encryption Standard) are symmetric algorithms
  • DevilsbaneDevilsbane ■■■■■■■■□□ Posts: 4,212Member ■■■■■■■■□□
    yiannit wrote: »
    RSA( Rivest, Shamir, Adelman) used in VPN, Digital Certificates etc. and ECC used in mobile devices ( Eliptical Curve Cryptography) are asymmetric cryptography also DH(Diffie Hellman) used for symmetric key exchange in IKE phase 1 in VPNs

    DES (Data Encryption Standard), 3DES , AES, AES256 (Advances Encryption Standard) are symmetric algorithms

    Where do the different versions of RC fall?
    Decide what to be and go be it.
  • yiannityiannit ■□□□□□□□□□ Posts: 27Member ■□□□□□□□□□
    Devilsbane wrote: »
    Where do the different versions of RC fall?

    symmetric used in ssl and wep
Sign In or Register to comment.