Advertisements
Advertisements
प्रश्न
Differentiate asymmetric and symmetric algorithms.
फरक स्पष्ट करा
उत्तर
Symmetric Key Encryption | Asymmetric Key Encryption |
Same key is used for both encryption and decryption. | Different keys are used for encryption and decryption. |
Speed of encryption or decryption is very fast. | Speed of encryption or decryption is comparatively slow. |
Plain text and cipher text are of same size. | The size of cipher text is always greater than plain text. |
Algorithms like DES, AES, RC4 uses symmetric key encryption. | Algorithms like RSA, ECC, DSA use asymmetric key encryption. |
Provides confidentially. | Provides confidentially, authenticity and non-repudiation. |
The number of key used grows exponentially with the numbers of users. | The number of key used grows linearly with the numbers of users. |
![]() |
![]() |
shaalaa.com
Security Technologies in E-commerce Transaction
या प्रश्नात किंवा उत्तरात काही त्रुटी आहे का?
APPEARS IN
संबंधित प्रश्न
Asymmetric encryption is also called as ______.
_____ protocol is used for securing credit cards transactions via the internet.
3-D Secure, a protocol was developed by ______.
Define non-repudiation.
List the different types of security technologies in E-Commerce.
Write about digital signature.
Explain 3D secure payment protocols.
Explain encryption technology.
Explain the features of Secure Electronic Transaction (SET).
Briefly explain SSL.