Asymmetric key cryptography/Related Articles

From Citizendium - Reading time: 2 min


See also changes related to Asymmetric key cryptography, or pages that link to Asymmetric key cryptography or to this page or whose text contains "Asymmetric key cryptography".

Parent topics[edit]

Sibling topic[edit]

  • Symmetric key cryptography [r]: A cryptographic system in which there is only one key; the same secret key is used for encryption and decryption. [e]

Techniques[edit]

  • Diffie-Hellman [r]: A technique that allows two parties to safely establish a shared secret for use as a cryptographic key, even if someone is eavesdropping on their interaction. It requires that the parties have some means of authentication to be sure they are talking to the right person. [e]
  • RSA algorithm [r]: A widely used public key encryption algorithm whose strength depends on the difficulty of integer factorisation. [e]

Applications[edit]

Other related topics[edit]

Articles related by keyphrases (Bot populated)[edit]

  • Hybrid cryptosystem [r]: A system that combines public key with secret key methods; usually with a cryptographic hash for authentication as well. [e]
  • Digital signature [r]: A technique based on public key cryptography to allow people to "sign" documents using their private keys. [e]
  • Diffie-Hellman [r]: A technique that allows two parties to safely establish a shared secret for use as a cryptographic key, even if someone is eavesdropping on their interaction. It requires that the parties have some means of authentication to be sure they are talking to the right person. [e]
  • Cryptographic key [r]: Value used by a computer together with a complex algorithm to encrypt and decrypt messages. [e]

Licensed under CC BY-SA 3.0 | Source: https://citizendium.org/wiki/Asymmetric_key_cryptography/Related_Articles
1 |
↧ Download this article as ZWI file
Encyclosphere.org EncycloReader is supported by the EncyclosphereKSF