Key
å¯é°æ¯å¯ç¢¼(cipher)ç¨æ¼å å¯(encryption) å/æè§£å¯(decryption)ç䏿¢ä¿¡æ¯ãéæ¼å å¯ç³»çµ±(cryptosystem)çææå å¯ä¿¡æ¯é½æè©²ä¿æå®å ¨ï¼é¤äºå¯é°ï¼éæ¯å ¬å ±çèªç¥ã
å¨å°ç¨±å¯é°å¯ç¢¼å¸(symmetric-key cryptography)ä¸ï¼åæä½¿ç¨ç¸åçå¯é°å è§£å¯ãå¨å ¬å ±å¯é°å¯ç¢¼å¸(public-key cryptography)ä¸ï¼åå¨ä¸å°ä½çºå ¬é°åç§é°çç¸éå¯é°ãå ¬é°æ¯å è²»æä¾çï¼èç§é°åæ¯ä¿å¯çãå ¬é°å¯ä»¥å°åªæç¸æç§é°è§£å¯çä¿¡æ¯å å¯ï¼åä¹äº¦ç¶ã
äºè§£æ´å¤
>æè¡åè
- ç¶åºç¾ç§ä¸ç Kerckhoffs's principle