Advertisements
Advertisements
प्रश्न
Differentiate asymmetric and symmetric algorithms.
अंतर स्पष्ट करें
Advertisements
उत्तर
| Symmetric Key Encryption | Asymmetric Key Encryption |
| Same key is used for both encryption and decryption. | Different keys are used for encryption and decryption. |
| Speed of encryption or decryption is very fast. | Speed of encryption or decryption is comparatively slow. |
| Plain text and cipher text are of same size. | The size of cipher text is always greater than plain text. |
| Algorithms like DES, AES, RC4 uses symmetric key encryption. | Algorithms like RSA, ECC, DSA use asymmetric key encryption. |
| Provides confidentially. | Provides confidentially, authenticity and non-repudiation. |
| The number of key used grows exponentially with the numbers of users. | The number of key used grows linearly with the numbers of users. |
![]() |
![]() |
shaalaa.com
Security Technologies in E-commerce Transaction
क्या इस प्रश्न या उत्तर में कोई त्रुटि है?
APPEARS IN
संबंधित प्रश्न
The security authentication technology does not include ______.
- Digital Signatures
- Digital Time Stamps
- Digital Technology
- Digital Certificates
_____ protocol is used for securing credit cards transactions via the internet.
3-D Secure, a protocol was developed by ______.
Define non-repudiation.
List the different types of security technologies in E-Commerce.
Write a note on certification authorities (CA).
Write a note on PGP.
Explain 3D secure payment protocols.
Explain encryption technology.
Briefly explain SSL.


