You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/_pages/categories.md
+1-49Lines changed: 1 addition & 49 deletions
Original file line number
Diff line number
Diff line change
@@ -165,50 +165,7 @@ Contributions to the Crypto Layer are welcome! If you find any issues or have su
165
165
The Crypto Layer is released under the [MIT License](LICENSE).
166
166
167
167
168
-
## Encryption Algorithms
169
-
OpenPGP (Open Pretty Good Privacy)
170
-
171
-
Overview:
172
-
OpenPGP is an open standard for the encryption and signing of emails and files, based on asymmetric cryptography. It uses a key pair consisting of a public key and a private key.
173
-
174
-
Functionality:
175
-
176
-
Encryption:
177
-
178
-
The public key of the recipient is used to encrypt the message or file.
179
-
Only the recipient can decrypt the message using their private key.
180
-
Signing:
181
-
182
-
The sender's private key is used to digitally sign the message or file.
183
-
The recipient can verify the sender's identity and ensure that the message has not been altered.
184
-
Advantages of OpenPGP:
185
-
186
-
Transparency: The open-source nature increases trust in the technology and security, as the code is auditable.
187
-
Versatility: It can be used for encrypting emails, files, and storage devices, and is compatible with many platforms.
188
-
Long-Term Use: OpenPGP keys can be used for many years.
189
-
Cost-Free: No license fees are required.
190
-
Disadvantages of OpenPGP:
191
-
192
-
Complexity: Setup and usage can be complicated.
193
-
Compatibility: Not all email clients and file archivers support OpenPGP.
194
-
User-Friendliness: OpenPGP programs are often not very user-friendly.
195
-
Cryptographic Algorithms:
196
-
197
-
RSA:
198
-
199
-
RSA is not preferred due to its security but inefficiency in key generation.
200
-
AES-256:
201
-
202
-
Symmetric encryption algorithm.
203
-
With 256-bit encryption, it is nearly impossible to guess the key.
204
-
More efficient than ECC-256 due to being symmetric.
205
-
Requires prior asymmetric encryption to securely transmit the key.
206
-
ECC-256:
207
-
208
-
Asymmetric encryption algorithm.
209
-
Very secure due to the Elliptic Curve Discrete Logarithm Problem (ECDLP).
210
-
Security depends on the choice of an appropriate elliptic curve.
211
-
More computationally intensive than AES due to the generation of two keys and more complex mathematical operations.
168
+
thematical operations.
212
169
Transport Layer Security (TLS):
213
170
TLS is a protocol for encrypting connections at the transport layer, which can be used to secure the connection itself, while OpenPGP encrypts the data within that connection.
214
171
@@ -223,8 +180,3 @@ In summary, both TLS and OpenPGP can be used to implement different layers of se
0 commit comments