3
Asymmetric Encryption Algorithms
Asymmetric encryption involves using different pairs of keys to encrypt and decrypt a message. A synonym of asymmetric encryption is public/private key encryption, but there are some differences between asymmetric and public/private key encryption, which we will discover in this chapter. Starting with a little bit of history of this revolutionary method of encryption/decryption, we will look at different types of asymmetric algorithms and how they help secure our credit cards, identity, and data.
In this chapter, we are going to cover the following topics:
- Public/private key and asymmetric encryption
- The Diffie-Hellman key exchange and the related man-in-the-middle problem
- RSA and an interesting application ...
Get Cryptography Algorithms - Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.