Advertisements
Advertisements
प्रश्न
Differentiate asymmetric and symmetric algorithms.
फरक स्पष्ट करा
Advertisements
उत्तर
| Symmetric Key Encryption | Asymmetric Key Encryption |
| Same key is used for both encryption and decryption. | Different keys are used for encryption and decryption. |
| Speed of encryption or decryption is very fast. | Speed of encryption or decryption is comparatively slow. |
| Plain text and cipher text are of same size. | The size of cipher text is always greater than plain text. |
| Algorithms like DES, AES, RC4 uses symmetric key encryption. | Algorithms like RSA, ECC, DSA use asymmetric key encryption. |
| Provides confidentially. | Provides confidentially, authenticity and non-repudiation. |
| The number of key used grows exponentially with the numbers of users. | The number of key used grows linearly with the numbers of users. |
![]() |
![]() |
shaalaa.com
Security Technologies in E-commerce Transaction
या प्रश्नात किंवा उत्तरात काही त्रुटी आहे का?
APPEARS IN
संबंधित प्रश्न
The security authentication technology does not include ______.
- Digital Signatures
- Digital Time Stamps
- Digital Technology
- Digital Certificates
Secure Electronic Transaction (SET) was developed in ______.
The websites secured by Secure Socket Layer protocols can be identified using ______.
Define non-repudiation.
Write about digital signature.
Write a note on certification authorities (CA).
Explain 3D secure payment protocols.
Explain encryption technology.
Define Secure Electronic Transaction (SET).
Briefly explain SSL.


