Vous êtes sur la page 1sur 8

Difference between DES and AES

DES is symetric encryption algorithem which means that u use the same key to encrypet
and decrypet the message
AES is asymetric encyption algorithem which means :
sender use the public key of the reciever to encrypet the message
reciever use it's private key to decrypt the message
DES was originally designed to run in specialized hardware and is considered
computationally expensive on general-purpose processors. AES was designed to run
efficiently on a variety of processors, including general-purpose ones.
AES is more secure when compared to DES as it uses large blocks for encryption and the
algorithm is relatively complicated than AES. Possible number of AES 128-bit keys are
1021 times greater than DES 56-bit keys, hence it is found that a machine that could
recover a DES key in a second (I.e. try 255keys per second) , it takes 149 trillion years to
crack a 128-bit AES key.
AES is much harder to break than DES but it is need more processing
both needs scheme to distribute keys between sender and reciever
from security point of view both of them are cryptography solutions, that means that they use
encryption as a methos to achive security goals
but from cryptography point of view they differ as one is symetric and the other is asymmetric

Digital Signature
A digital code that can be attached to an electronically transmitted message that uniquely
identifies the sender. Like a written signature, the purpose of a digital signature is to guarantee
that the individual sending the message really is who he or she claims to be. Digital signatures
are especially important for electronic commerce and are a key component of
most authentication schemes. To be effective, digital signatures must be unforgeable.
There are a number of different encryption techniques to guarantee this level of security.
Applications of digital signatures

Digital signatures offer many applications other than signing messages such as e-mail. A
digital signature can be created for any kind of file. The digital signature then can be
used as proof that the file was not modified after the digital signature was created. It
can also be used to make the file unique, for example by appending a serial number to
the file and signing the result.

Athenticating Web Server, Time Stamping Services,


an elliptic curve will simply be the set of points described by the equation:

Where 4a3 + 27b2 0 (this is required to exclude singular curves). The equation above is
what is called Weierstrass normal form for elliptic curves.

Different shapes for different elliptic curves (b = 1, a varying from 2 to -3).

Types of singularities: on the left, a curve with a cusp (y2 = x3).


On the right, a curve with a self-intersection (y2 = x3 3x + 2). None of them is a valid elliptic
curve.
Depending on the value of a and b, elliptic curves may assume different shapes on the
plane. As it can be easily seen and verified, elliptic curves are symmetric about the xaxis.

NUMBER THEORY, sometimes referred to as higher arithmetic. Number theorists scrutinize the
properties of integers, the natural numbers you know as -1, -2, 0, 1, 2 and so forth. It's part theoretical
and part experimental, as mathematicians seek to discover fascinating and even unexpected
mathematical interactions.
What kind of relationships? Well, we actually categorize integers into different number types based on
their relationships. There are, of course, odd numbers (1,3, 5 ), which cannot be divided evenly,
and even numbers (2, 4, 6 ), which can. There are square numbers, produced by multiplying another

number by itself. For instance, 2 x 2 = 4 and 3 x 3 = 9, so 4 and 9 are both square numbers. So is 1 (1 x 1
= 1) and so is 9,801 (99 x 99 = 9,801). We also express these four examples as 22, 32, 12 and 992.

Vous aimerez peut-être aussi