![]()
From: Burak DAYIOGLU (dayioglu@metu.edu.tr)
Date: Tue 18 Feb 2003 - 12:43:27 EET
Merhaba,
Iki farkli kitapta CELISEN iki farkli public key cryptography tanimi
var; sizlerin goruslerine sunmak ve fikirlerinizi duymak istiyorum:
Ben ikinci kitaptaki (Secured Computing) gibi dusunuyordum simdiye
kadar: "Asymmetric crypto = public key crypto"... Public key
cryptography de mi bir "buzzword" haline geliyor yoksa? :)
---- All in One CISSP Certification: Public key cryptography uses two keys (public and private) generated by an asymmetric algorithm for protecting encryption keys and key distribution and a secret key is generated by a symmetric algorithm and used for bulk encryption. It is a hybrid use of two different algorithms: asymmetric and symmetric. Each algorithm has its pros and cons, so using them together can bring together the best of both worlds. Secured Computing, A CISSP Study Guide: A big disadvantage of public key cryptography is its speed. The best solution is to combine public key and secret key systems in order to get both the security advantages of public-key systems and speed advantages of secret key systems. ---- selamlar, iyi calismalar. -- Burak DAYIOGLU Phone: +90 312 2103379 Fax: +90 312 2103333 http://www.dayioglu.net ICQ UIN: 72276975 ----------------------------------------------------------------------- Liste üyeliğiniz ile ilgili her türlü işlem için http://liste.linux.org.tr adresindeki web arayüzünü kullanabilirsiniz. Listeden çıkmak için: 'linux-guvenlik-request@linux.org.tr' adresine, "Konu" kısmında "unsubscribe" yazan bir e-posta gönderiniz. -----------------------------------------------------------------------
![]()