Download presentation
Presentation is loading. Please wait.
Published byAlbert Ellis Modified over 8 years ago
1
Paper On Cryptography CS300 Technical Paper Review Avinash Chambhare Abdus Samad
2
Mistakes Wiki edit was copied from the cited source The cited source was not reliable according to some users Some unnecessary edits were added.
3
Improvements More reliable source to back the edit was added Removed the unnecessary edits Added more information to existing edits
4
Earlier Edit There are two kinds of cryptosystems: symmetric and asymmetric. Symmetric cryptosystems use the same key (the secret key) to encrypt and decrypt a message, and asymmetric cryptosystems use one key (the public key) to encrypt a message and a different key (the private key) to decrypt it. Asymmetric cryptosystems are also called public key cryptosystems.
5
Final Edit There are two kinds of cryptosystems: symmetric and asymmetric. In symmetric systems the same key (the secret key) is used to encrypt and decrypt a message. Data manipulation in symmetric systems is faster than asymmetric systems as they generally use shorter key lengths. Asymmetric systems use public key to encrypt a message and a private key to decrypt it. Use of asymmetric systems enhances the security of communication.
6
Thank You
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.