Skip to Content
Advanced Infrastructure Penetration Testing
book

Advanced Infrastructure Penetration Testing

by Chiheb Chebbi
February 2018
Intermediate to advanced
396 pages
9h 38m
English
Packt Publishing
Content preview from Advanced Infrastructure Penetration Testing

Asymmetric cryptosystem

Following are the algorithms of Asymmetric cryptosystem:

  • Rivest-Shamir-Adleman (RSA): RSA is one of the most widely used cryptosystems on the internet. It was developed by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. When using RSA, a pair of keys will be generated, a private key, and a public key.
  • Diffie-Hellman key exchange: The Diffie-Hellman key exchange is a way of creating a key without sharing and exchanging information during this operation.

The basic idea works like this:

    1. Select two prime numbers, g and p 
    2. Compute ga mod p and send the output
    3. The other key computes gb mod p and sends the output B
    4. Compute Ba mod p
    5. The same on the other key computes Ab mod p
  • El Gamal: El Gamal is a cryptosystem ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Practical Web Penetration Testing

Practical Web Penetration Testing

Gus Khawaja
Securing Network Infrastructure

Securing Network Infrastructure

Sairam Jetty, Sagar Rahalkar

Publisher Resources

ISBN: 9781788624480Supplemental Content