In: Computer Science
1) Encryption algorithms are often divided into two categories, known as symmetric and asymmetric encryption. The fundamental difference between these two methods of encryption relies on the fact that symmetric encryption algorithms make use of a single key, while asymmetric encryption makes use of two different but related keys. The symmetric encryption is used for bulk data transmission whereas asymmetric encryption is often used for securely exchanging secret keys.Algorithms use by symmetric encryption are DES, 3DES, AES, and RC4.and algorithms use by asymmetric encryption are Diffie-Hellman, RSA.
2)
PKI(public key infrastructure) is the technology that allows you to encrypt data, digitally sign documents, and authenticate yourself using certificates.
PKI ( public key infrastructure) which is the technology behind digital certificates. A digital certificate fulfills a similar purpose to a driver’s license or a passport – it is a piece of identification that proves your identity and provides certain allowances. A digital certificate allows its owner to encrypt, sign, and authenticate.