Why would you use symmetric encryption instead of asymmetric one?
Let’s learn why would you use symmetric encryption instead of asymmetric one. The most accurate or helpful solution is served by Quora.
There are ten answers to this question.
Best solution
As I understand it, one-time pads are still considered to provide essentially unbreakable encryption. Originally, they consisted of physical pads of random characters two copies of which were made, one for each of two parties who wanted to communicate...
Answer:
Part of the security of the OTP is that the you take the plain text and xor it with a random key. NYT...
Bill Broadley at Quora Mark as irrelevant Undo
Other solutions
Answer:
ZixCorp is a top rated email encryption service. InviziVault 1, IronPort or Private Notepad are top...
Michael A. at ChaCha Mark as irrelevant Undo
Help me understand how encryption works when there's just one device involved. Okay, I think I finally understand at a high level how public key encryption works: each side generates a public/private key pair, sends the public key to the other party...
Answer:
an attacker could just generate all the keys for passwords up to 20 characters in lengthThere are over...
Tehhund at Ask.Metafilter.Com Mark as irrelevant Undo
We are currently switching hosting providers and setting up tunnels between our client sites and our new hosting provider. Our new hosting provider recommended using encryption domains to limit the access of the tunnel, and we decided to give it a try...
Answer:
I am not sure what the "encryption domain" is, but I can tell you that I have a nest of different...
shahaly at Yahoo! Answers Mark as irrelevant Undo
Over the last several years, I've seen more developers use openssl for file and message signing and encryption, where in the past we would have used PGP/gnupg/OpenPGP. Is this wise, is it essentially throwing away the work that went into the PGP web...
Answer:
OpenSSL is a perfectly acceptable solution to this problem. PGP is designed for encrypting and signing...
Michael Hamburg at Quora Mark as irrelevant Undo
If I look at OpenSSL, I see that there are aesni_xts_encrypt () and aesni_set_encrypt_key () methods, although those may be internal methods. Also I write code that uses AES_bi_ige_encrypt () (which is a different mode, I know, but it shows that I can...
Answer:
As of early 2015, the easiest way to use hardware acceleration is by using OpenSSL's high level crypto...
Fernando Montenegro at Quora Mark as irrelevant Undo
If P is the plaintext, R is random data as long as the plaintext, and E1 and E2 are different encryption algorithms with independently chosen keys and IVs, my intuition says that: C = E1 (R) || E2 (R xor P) (with || designating an append) is secure...
Answer:
"Encryption algorithm" is fairly broad. Most algorithms are designed so that (if they aren...
Michael Hamburg at Quora Mark as irrelevant Undo
I am developing a side project for supporting data encryption on Linux platform. My code encrypts the files using AES256CBC. (I am using OpenSSL Crypto API). The user can encrypt the files and at some later time can decrypt the files. An AES key is generated...
Answer:
While this might not answer your question, I just thought I'd share something I came across. In ARM...
Sailesh Mukil at Quora Mark as irrelevant Undo
I'm aware of many drives which claim to offer encryption, but I am referring to verifiable strong encryption, not just password protection. Probably requires a master key, encrypted with a user supplied password, used to encrypt all the data written...
Answer:
Yes, any drive advertised as FDE (full disk encryption) or SED (self-encrypting drive) or as supporting...
Yi-Nan Zhang at Quora Mark as irrelevant Undo
Help me do a one-time "cloud" back-up of archived text files and stuff in order to supplement my Time Machine backup. I use a Mac. I'm protected against disk failure via Time Machine. But that won't protect me against a house fire, robbery...
Answer:
Dolly Drive is a cloud-based Time Machine compatible backup service. For $50 they will FedEx you a drive...
Quisp Lover at Ask.Metafilter.Com Mark as irrelevant Undo
Related Q & A:
- Why do we use quicksort instead of heapsort?Best solution by Yahoo! Answers
- How do I use my nickname instead of my real name on messenger?Best solution by Yahoo! Answers
- What exactly is an RSS feed and how/why would you use one?Best solution by Super User
- Why do we use Gross Domestic Product instead of Net Domestic Product?Best solution by Yahoo! Answers
- How can I get my regular avatar of a real picture back as my avatar instead of the one now?Best solution by Yahoo! Answers
Just Added Q & A:
- How many active mobile subscribers are there in China?Best solution by Quora
- How to find the right vacation?Best solution by bookit.com
- How To Make Your Own Primer?Best solution by thekrazycouponlady.com
- How do you get the domain & range?Best solution by ChaCha
- How do you open pop up blockers?Best solution by Yahoo! Answers
For every problem there is a solution! Proved by Solucija.
-
Got an issue and looking for advice?
-
Ask Solucija to search every corner of the Web for help.
-
Get workable solutions and helpful tips in a moment.
Just ask Solucija about an issue you face and immediately get a list of ready solutions, answers and tips from other Internet users. We always provide the most suitable and complete answer to your question at the top, along with a few good alternatives below.