Chapter 2. Public-Key Cryptography
In this chapter, we introduce the main concepts of public-key cryptography. The treatment is intentionally high level and brief, touching only on aspects directly relevant to an understanding of the remainder of this book. For a broader and more thorough discussion, read the Handbook of Applied Cryptography [MvOV97], Applied Cryptography: Protocols, Algorithms, and Source Code in C [Schn96], Cryptography and Network Security: Principles and Practice [Stal99], or Cryptography: Theory and Practice [Stin95].
Symmetric versus Asymmetric Ciphers
For as long as humans have communicated, there has been a desire to keep some communications confidential (that is, “hidden”) from unintended recipients. Over thousands of years, ...
Get Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.