January 2018
Intermediate to advanced
524 pages
13h 33m
English
Asymmetric cryptography is also called public key cryptography. Asymmetric keys are generated in pairs (encrypting and decrypting). The keys can be interchangeable meaning a key could both encrypt and decrypt, but that is not a requirement. The typical use, however, is to generate a pair of keys and keep one private and the other public. This section describes the three foundational public key cryptograms: RSA, Diffie-Hellman, and Elliptical Curves.
The first asymmetric public key encryption method described is the Rivest-Shamir-Adleman algorithm, or RSA, developed ...
Read now
Unlock full access