Chapter 15. Asymmetric Encryption and PKI
This chapter covers the following topics:
Asymmetric algorithms are based on complex mathematical formulas, and therefore computation takes more time than symmetric algorithms.
Examples of public key encryption algorithms are the Rivest, Shamir, and Adleman (RSA) algorithm; Digital Signature Algorithm (DSA); Diffie-Hellman (D-H); ElGamal; and elliptic curve cryptography (ECC).
Public Key Confidentiality and Authentication
Asymmetric algorithms use a public key and a private key. Both keys are capable ...