19.5. Data security with public-key technology

19.5.1. Conventional and public-key cryptography

Conventional encryption methods only use one key for encryption and decryption. The sender encrypts the message or document with this key and sends it to the receiver. In order to decrypt this document, the receiver has to have the same key.

The advantage of the algorithms in these methods is that they are fast, efficient, and computationally safe. Some popular implementations are:

  • IDEA [IDEA]

  • Blowfish (128-bit key, 16 rounds)

  • DES (DES-EDE)

  • CAST5 (128-bit key, known as RFC 2144)

For further information, the description and algorithm of the first three are available from the “Cypto C-Source” Web site (www.cc.jyu.fi/~paasivir/crypt/source.html). The CAST5 ...

Get Practical Web Technologies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.