public-key cryptography

(redirected from Asymmetric Algorithms)
Also found in: Wikipedia.

public-key cryptography

References in periodicals archive ?
2) The Back propagation can be considered analogy to the Asymmetric Algorithms like RSA, Knapsack problem.
It shares the same common features of Atmel's secureAVR(R) family including its outstanding 8-bit/16-bit RISC CPU performance, strong security mechanisms, firewalls and two cryptographic co-processors, one for asymmetric algorithms (RSA) and one for DES/Triple DES.
Asymmetric algorithms are based on mathematically related, but different keys.
Cards built on the TrustedFlash platform will provide full digital rights management capabilities, supporting industry security standards such as both symmetric and asymmetric algorithms.
They also have an impressive set of cryptographic features: hardware DES/TDES, AES and SHA-n, a cryptographic accelerator for asymmetric algorithms (RSA, elliptic curves, key generation) and a true random number generator.
0 employs its own cryptographically strong random number generator and a powerful combination of symmetric and asymmetric algorithms to encrypt and decrypt archived data.
NET platform for smart cards includes cryptographic functions for encryption, digital signatures, hashing, and random number generation and has support for all major types of symmetric and asymmetric algorithms.
It also has an impressive set of cryptography features, hardware DES/TDES, hardware AES, hardware SHA-n, hardware cryptography accelerator for asymmetric algorithms (RSA, Elliptic curves, Key generation) and a true random number generator.
Its efficiency is ensured by user authentication on the system start, symmetric encryption for data protection and integrity control, asymmetric algorithms for additional key exchange and digital signatures, checksum control of program modules against tempering, and a personal firewall with preset and custom policies and filters.
Asymmetric algorithms such as RSA, DH and DSS with key lengths up to 4096-bits are supported with a peak performance of 60K 180-bit exponent DH or 40K 1024-bit exponent RSA operations per second.
It features an outstanding 16-bit CPU performance, 192 Kbytes of ROM, 64 Kbytes of EEPROM, 6 Kbytes of RAM and a host of security mechanisms including firewalls and two cryptographic co-processors: one for the asymmetric algorithms (RSA, DSA, Elliptic Curves) and one for the DES/TripleDES.
Moreover, the SSL VPN Certification criteria specify that keys below 128 bits for symmetric algorithms and 1024 bits for asymmetric algorithms must not be used by default.