© Seth James Nielson, Christopher K. Monson 2019
S. J. Nielson, C. K. MonsonPractical Cryptography in Pythonhttps://doi.org/10.1007/978-1-4842-4900-0_6

6. Combining Asymmetric and Symmetric Algorithms

Seth James Nielson1  and Christopher K. Monson2
(1)
Austin, TX, USA
(2)
Hampstead, MD, USA
 

In this chapter, we’ll spend time getting familiar with how asymmetric encryption is typically used, where it is a critical part of communication privacy, but not responsible for all of it. Typically, asymmetric encryption, also known as “public key cryptography”, is used to establish a trusted session between two parties, and the communication while within that session is protected with much faster symmetric methods.

Let’s dive in with a short example and some code! ...

Get Practical Cryptography in Python: Learning Correct Cryptography by Example now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.