Secret key

The corresponding substitution relationship between passwords and explicit codes
Collect
Check out my collection
0 Useful +1
0
This entry is reviewed by the "Science China" science encyclopedia entry compilation and application work project.
The key is the corresponding substitution relationship between the password and the explicit code, which is divided into Symmetric key with Asymmetric key . If 00, 01, 02, 03 replace the letters A, B, C, D, then 00 translated into A, 01 translated into B, 02 translated into C, 03 translated into D is the key. [2 ]
" Modern Chinese Dictionary (7th edition) Note: The pinyin of the key is mi yue (read mi yao in spoken English). [2 ]
Chinese name
Secret key
Foreign name
secret key
spelling
mi yue (more pronounced mi yao in spoken English) [2 ] [3]
nature
Common terms in cryptography
Use...
Noun, used as a verb in rare cases
correlative
Cryptography, public key, private key
Explained in cryptography
Secret key, secret code
Archaism interpretation
Tight locking

Read law and function

broadcast
EDITOR
Asymmetric key
In cryptography: secret key - a tool used to encrypt and decrypt data; private key - private encryption and decryption tool; public key - A public encryption and decryption tool.

Key classification

broadcast
EDITOR
There are two types of keys: symmetric keys and asymmetric keys
Two types of key
Related books
According to whether the encryption key and decryption key used by the cryptographic algorithm are the same, and whether the decryption process can be derived from the encryption process (or the encryption process can be derived from the decryption process), the cryptographic system can be divided into two parts Symmetric cryptosystem (also known as single key cryptosystem, secret key cryptosystem, symmetric key cryptosystem) and Asymmetric cryptosystem (Also known as double key cryptosystem, public key cryptosystem, asymmetric key cryptosystem). [1]
Symmetric key encryption Also known as private key encryption or session key encryption algorithm, that is, the sender and the receiver of information use the same key to encrypt and decrypt data. Its biggest advantage is that the encryption/decryption speed is fast, which is suitable for encrypting large amounts of data, but the key management is difficult.
Asymmetric key encryption system , also known as public key encryption. It requires the use of different keys to complete the encryption and decryption operations, one is published publicly, that is, the public key, and the other is kept secretly by the user himself, that is, the private key. For message senders Public key To encrypt, and the recipient of the message using a private key to decrypt. The public key mechanism is flexible, but the encryption and decryption speed is much slower than that of symmetric key encryption.
So in practical applications, people usually use the two together, for example, symmetric key encryption system is used to store a large amount of data information, and Public key encryption The system is used to encrypt the key.
For normal symmetric cryptography, the encryption operation uses the same key as the decryption operation. Usually, the symmetric encryption algorithm used is relatively simple and efficient, the key is short, and it is extremely difficult to decipher, because the confidentiality of the system mainly depends on the security of the key, so it is a serious problem to securely transmit and keep the key on the public computer network. It is precisely because both parties use the same key in symmetric cryptography that functions such as data signature and non-repudiation cannot be achieved.
Since the 1970s, some scholars have put forward the public key system, which uses the mathematical principle of one-way function to realize the separation of encryption and decryption keys. The encryption key is public and the decryption key is private. This new cryptographic system has aroused extensive attention and discussion in the field of cryptography.
Unlike ordinary symmetric cryptography, which uses the same key to encrypt and decrypt data, asymmetric key encryption technology uses a pair of matching keys for encryption and decryption, with two keys, one is Public key One is Private key They have the property that each key performs a one-way processing of data, and each key performs the exact opposite function of the other, where one is used for encryption and the other is used for decryption. A file encrypted with a public key can only be decrypted with a private key, and a file encrypted with a private key can only be decrypted with a public key. Public keys are disclosed by their owners, while private keys must be kept secret. To send a secret message, the sender must encrypt the data with the receiver's public key, and once encrypted, only the receiver can decrypt it with its private key. Conversely, users can process the data with their own private keys. In other words, the key pair can work in any direction. This provides" Digital signature If you want a user to process the data with his own private key, someone else can process the data with the public key he provides. Since only the owner knows the private key, the processed message forms an electronic signature - a document that no one else can produce. Digital certificate Contains public key information, thus confirming the identity of the user who owns the key pair.
A simple example of a public key can be represented by a prime number. The algorithm of multiplying prime numbers is the public key, and the algorithm of decomposing the obtained product into the original prime number is the private key. Encryption is to add prime numbers to the information to be transmitted when encoding it, and then send it to the recipient. Then the process of decryption (actually the process of finding prime numbers) will be affected by the process of finding prime numbers ( Decomposition prime factor Too long to interpret the information.