Table of contents
- 1. Divided by encryption algorithm type
- 2. Divided by application scenario
- 3. Divided by key management method
- 4. Hybrid encryption system
- 5. Physical layer encryption
- 6. Frontier encryption technology
The following is a classification and sorting out encryption technology, divided into six categories according to the main application areas and technical characteristics:
-
Algorithm type
- symmetry
- Group encryption
- Sequence password
- Asymmetric
- Hash
- symmetry
-
Application scenarios
- transmission
- storage
- identity
- privacy
-
Key Management
- Centralized
- distributed
- Exchange Agreement
-
Hybrid system
- RSA+AES and other combinations
- PKI
-
Physical layer encryption
- QKD
- Optical communication
-
Frontier Technology
- Quantum resistance
- FHE
- ABE
1. Divided by encryption algorithm type
-
Symmetric encryption
- Features: Encryption and decryption use the same key
- Algorithm example:
- AES (Advanced Encryption Standard)
- DES (data encryption standard, gradually eliminated)
- 3DES (Triple DES)
- ChaCha20 (Mobile Efficient Algorithm)
-
Asymmetric encryption
- Features: Public key encryption, private key decryption
- Algorithm example:
- RSA (based on large numbers decomposition)
- ECC (elliptic curve encryption, low resource usage)
- ElGamal (Discrete Logarithm Problem)
-
Hash algorithm (one-way encryption)
- Features: Irreversible, generates a fixed-length summary
- Algorithm example:
- SHA-256/SHA-3 (Safe hash)
- MD5 (Not recommended for safe scenarios)
- BLAKE3 (High performance hash)
2. Divided by application scenario
-
Data transmission encryption
- Protocol: TLS/SSL (Basic HTTPS), IPSec (commonly used in VPN)
-
Data storage encryption
- Technology: Disk encryption (BitLocker), Database Field Encryption (AES-GCM)
-
Identity Authentication
- Applications: Digital Signature (RSA/ECDSA), JWT Token (HMAC Encryption)
-
Privacy protection
- Technology: Homomorphic encryption (directly processing encrypted data), zero-knowledge proof
3. Divided by key management method
-
Centralized key management
- Tools: HSM (hardware security module), KMS (key management system)
-
Distributed key management
- Technology: Shamir secret sharing, blockchain multi-signature mechanism
-
Key Exchange Protocol
- Algorithms: Diffie-Hellman (classic key exchange), SPAKE2 (anti-man-in-the-middle attack)
4. Hybrid encryption system
-
Typical Solution
- Asymmetric encryption passes symmetric keys (such as RSA+AES)
- Application scenarios: SSL/TLS handshake process, PGP email encryption
5. Physical layer encryption
-
Quantum Key Distribution (QKD)
- Principle: Quantum entangled state transmission key
- Agreement: BB84, E91
-
Optical communication encryption
- Technology: Chaos laser encryption, OTN layer encryption
6. Frontier encryption technology
-
Anti-quantum encryption
- Algorithm: Kyber (based on grid theory), SPHINCS+ (hash signature scheme)
-
Fully homomorphic encryption (FHE)
- Features: Supports direct calculation of encrypted data
- Application: Privacy AI training, encrypted database query
-
Attribute-based encryption (ABE)
- Features: Dynamically control decryption permissions based on attributes