This chapter covers the following topics:
Asymmetric algorithms are based on complex mathematical formulas, and therefore computation takes more time than symmetric algorithms.
Examples of public key encryption algorithms are the Rivest, Shamir, and Adleman (RSA) algorithm; Digital Signature Algorithm (DSA); Diffie-Hellman (D-H); ElGamal; and elliptic curve cryptography (ECC).
Asymmetric algorithms use a public key and a private key. Both keys are capable ...