The key concepts related to security in computing: hashing, symmetric encryption, asymmetric encryption, digital signatures, SSL/TLS protocol flow, and OAuth 2.0 flow. 1. Hashing Purpose : Hashing is a one-way function used to convert data into a fixed-size hash value, which is typically used for data integrity verification. Characteristics : Deterministic: The same input always produces the same output. Irreversible: It should be computationally infeasible to reverse the hash to retrieve the original data. Collision-resistant: Two different inputs should not produce the same hash output (though some algorithms like MD5 and SHA-1 are now considered weak). Common Algorithms : MD5, SHA-1, SHA-256, SHA-3. 2. Symmetric Encryption Purpose : Symmetric encryption uses the same key for both encryption and decryption, making it efficient but requiring secure key distribution. Use Cases : Encrypting data at rest, encrypting data in transit (e.g., SSL/TLS), and securing communication channel...
Comments
Post a Comment