6
Asymmetric-key Algorithms
1. What are the requirements of asymmetric-key cryptography? Or What are the characteristics that an asymmetric-key cryptographic algorithm must possess?
Ans.: Asymmetric-key cryptography requires the use of two different keys: the public key for encryption and private key for decryption. The public key is known to everyone, whereas the private key is known to its owner only. Diffie and Hellman laid out some requirements that must be fulfilled by the algorithms used for asymmetric-key cryptography. These requirements are listed below:
It should be easy for the receiver to generate the pair ...
Get Express Learning: Cryptography and Network Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.