Advertisements
Advertisements
प्रश्न
Differentiate asymmetric and symmetric algorithms.
अंतर स्पष्ट करें
उत्तर
Symmetric Key Encryption | Asymmetric Key Encryption |
Same key is used for both encryption and decryption. | Different keys are used for encryption and decryption. |
Speed of encryption or decryption is very fast. | Speed of encryption or decryption is comparatively slow. |
Plain text and cipher text are of same size. | The size of cipher text is always greater than plain text. |
Algorithms like DES, AES, RC4 uses symmetric key encryption. | Algorithms like RSA, ECC, DSA use asymmetric key encryption. |
Provides confidentially. | Provides confidentially, authenticity and non-repudiation. |
The number of key used grows exponentially with the numbers of users. | The number of key used grows linearly with the numbers of users. |
![]() |
![]() |
shaalaa.com
Security Technologies in E-commerce Transaction
क्या इस प्रश्न या उत्तर में कोई त्रुटि है?
APPEARS IN
संबंधित प्रश्न
The security authentication technology does not include ______.
- Digital Signatures
- Digital Time Stamps
- Digital Technology
- Digital Certificates
PGP stands for ______.
_____ protocol is used for securing credit cards transactions via the internet.
The websites secured by Secure Socket Layer protocols can be identified using ______.
Define non-repudiation.
Write about digital signature.
Explain encryption technology.
Differenticate digital signatures and digital certificates.
Define Secure Electronic Transaction (SET).
Explain the features of Secure Electronic Transaction (SET).