Types of Keys
Cryptographic systems may use different types of keys, with some systems using more than one. These may include symmetric keys or asymmetric keys. In a symmetric key algorithm the keys involved are identical for both encrypting and decrypting a message. Keys must be chosen carefully, and distributed and stored securely. Asymmetric keys, in contrast, are two distinct keys that are mathematically linked. They are typically used in conjunction to communicate.
Read more about this topic: Key Management
Famous quotes containing the words types of, types and/or keys:
“Science is intimately integrated with the whole social structure and cultural tradition. They mutually support one otheronly in certain types of society can science flourish, and conversely without a continuous and healthy development and application of science such a society cannot function properly.”
—Talcott Parsons (19021979)
“He types his laboured columnweary drudge!
Senile fudge and solemn:
Spare, editor, to condemn
These dry leaves of his autumn.”
—Robertson Davies (b. 1913)
“without luggage or defenses,
giving up my car keys and my cash,
keeping only a pack of Salem cigarettes
the way a child holds on to a toy.
I signed myself in where a stranger
puts the inked-in Xs”
—Anne Sexton (19281974)