7ASYMMETRIC KEY ALGORITHMS

NASRIN SULTANA AND SAIFUL AZAD

Contents

Keywords

7.1 Basic Concept

7.2 Applications of Asymmetric Key Algorithms

7.2.1 Encryption/Decryption

7.2.2 Digital Signature

7.2.3 Encryption and Digital Signature

Keywords

Asymmetric key algorithm

Digital signature

Private key

Public key

In the very early era of cryptography, multiple parties involved in secret message exchange had to depend on a secret key that they interchanged among themselves through a trusted, but noncryptographic method. Generally, simple methods like one-to-one communication through a reliable carrier were exercised to exchange any secret key. They kept this key absolutely secret among themselves. Later, this secret key would be utilized to encrypt their ...

Get Practical Cryptography now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.