O'Reilly logo

Practical Cryptography by Al-Sakib Khan Pathan, Saiful Azad

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

7ASYMMETRIC KEY ALGORITHMS

NASRIN SULTANA AND SAIFUL AZAD

Contents

Keywords

7.1 Basic Concept

7.2 Applications of Asymmetric Key Algorithms

7.2.1 Encryption/Decryption

7.2.2 Digital Signature

7.2.3 Encryption and Digital Signature

Keywords

Asymmetric key algorithm

Digital signature

Private key

Public key

In the very early era of cryptography, multiple parties involved in secret message exchange had to depend on a secret key that they interchanged among themselves through a trusted, but noncryptographic method. Generally, simple methods like one-to-one communication through a reliable carrier were exercised to exchange any secret key. They kept this key absolutely secret among themselves. Later, this secret key would be utilized to encrypt their ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required