7ASYMMETRIC KEY ALGORITHMS
NASRIN SULTANA AND SAIFUL AZAD
Contents
7.2 Applications of Asymmetric Key Algorithms
7.2.3 Encryption and Digital Signature
Keywords
Asymmetric key algorithm
Digital signature
Private key
Public key
In the very early era of cryptography, multiple parties involved in secret message exchange had to depend on a secret key that they interchanged among themselves through a trusted, but noncryptographic method. Generally, simple methods like one-to-one communication through a reliable carrier were exercised to exchange any secret key. They kept this key absolutely secret among themselves. Later, this secret key would be utilized to encrypt their ...
Get Practical Cryptography now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.