Skip to Main Content
Express Learning: Cryptography and Network Security
book

Express Learning: Cryptography and Network Security

by ITL Education Solutions Limited
January 2012
Intermediate to advanced content levelIntermediate to advanced
196 pages
6h 43m
English
Pearson India
Content preview from Express Learning: Cryptography and Network Security

6

Asymmetric-key Algorithms

1. What are the requirements of asymmetric-key cryptography?            Or            What are the characteristics that an asymmetric-key cryptographic algorithm must possess?

Ans.: Asymmetric-key cryptography requires the use of two different keys: the public key for encryption and private key for decryption. The public key is known to everyone, whereas the private key is known to its owner only. Diffie and Hellman laid out some requirements that must be fulfilled by the algorithms used for asymmetric-key cryptography. These requirements are listed below:

images   It should be easy for the receiver to generate the pair ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

CCNA Cyber Ops SECOPS 210-255

CCNA Cyber Ops SECOPS 210-255

Omar Santos
Visual Cryptography and Secret Image Sharing

Visual Cryptography and Secret Image Sharing

Stelvio Cimato, Ching-Nung Yang
Red Hat Enterprise Linux 8 Administration

Red Hat Enterprise Linux 8 Administration

Miguel Pérez Colino, Pablo Iranzo Gómez, Scott McCarty

Publisher Resources

ISBN: 9788131764527