About 64,300 results
Open links in new tab
  1. cryptography - Which symmetric key algorithm does SSL use ... - Stack ...

    16 I understand that through SSL, the browser gets the public key of the secured website and through public key encryption rsa algorithm, these 2 establish session key and then continue communication …

  2. Java using AES 256 and 128 Symmetric-key encryption

    18 Whether AES uses 128 or 256 bit mode depends on size of your key, which must be 128 or 256 bits long. Typically you don't use your password as a key, because passwords rarely have exact length …

  3. AES encryption, what are public and private keys?

    Public-key cryptography involves two related keys for each recipient involved - a private key which is a secret known only by the recipient, and a related public key which is known by all senders. The …

  4. cryptography - Symmetric and public key encryption - Stack Overflow

    Suppose N people want to communicate with each of N- 1 other people using symmetric key encryption. All communication between any two people, i and j, is visible to all other people in this group o...

  5. The report server Cannot decrypt the symmetric key used to access ...

    Oct 1, 2013 · The Report Server service uses the symmetric key to access the encrypted data in a report server database. This symmetric key is encrypted by using an asymmetric public key that …

  6. How does HTTPS provide security? - Stack Overflow

    Oct 19, 2010 · The server decrypts it using its private key (using asymmetric cryptography algorithm). Data Exchange - This public key is now know by both client and server. It is used for subsequent …

  7. security - Fundamental difference between Hashing and Encryption ...

    Symmetric-key(symmetric) cryptography (e.g. DES, AES) uses the same key for encode and decode. It is a kind of a private key because it should be kept private to have a private comunication

  8. How does SSL use symmetric and asymmetric encryption? And how do …

    AFAIK SSL uses public key cryptography (ie. asymmetric encryption) to verify the identity (as the answerer said) and afterwards symmetric encryption to get things rolling faster (since the possibility …

  9. HTTPS uses Asymmetric or Symmetric encryption?

    Jun 13, 2016 · The best answer is that it does both. TLS uses asymmetric encryption to first establish the identity of one or both parties. Secondly, it uses asymmetric encryption to exchange a key to a …

  10. security - Difference between asymmetric and symmetric encryption ...

    Asymmetric encryption helps solve the key distribution problem, but only barely: instead of requiring O (N^2) key pairs between every pair of people wanting to use cryptography to talk amongst …