public-key cryptography

(redirected from Asymmetric algorithm)
Also found in: Wikipedia.

public-key cryptography

References in periodicals archive ?
The Paillier cryptosystem is a probabilistic asymmetric algorithm for public key cryptography and the algorithm works as follows.
NTRUEncrypt(TM), an alternative asymmetric algorithm to the more well-known RSA and Elliptic Curve Cryptography (ECC) algorithms, was named winner of the 2011 Tomorrow's Technology Today Award for mobile encryption.
2) The Back propagation can be considered analogy to the Asymmetric Algorithms like RSA, Knapsack problem.
It shares the same common features of Atmel's secureAVR(R) family including its outstanding 8-bit/16-bit RISC CPU performance, strong security mechanisms, firewalls and two cryptographic co-processors, one for asymmetric algorithms (RSA) and one for DES/Triple DES.
Asymmetric algorithms are based on mathematically related, but different keys.
They also have an impressive set of cryptographic features: hardware DES/TDES, AES and SHA-n, a cryptographic accelerator for asymmetric algorithms (RSA, elliptic curves, key generation) and a true random number generator.
Cards built on the TrustedFlash platform will provide full digital rights management capabilities, supporting industry security standards such as both symmetric and asymmetric algorithms.
NET platform for smart cards includes cryptographic functions for encryption, digital signatures, hashing, and random number generation and has support for all major types of symmetric and asymmetric algorithms.
It also has an impressive set of cryptography features, hardware DES/TDES, hardware AES, hardware SHA-n, hardware cryptography accelerator for asymmetric algorithms (RSA, Elliptic curves, Key generation) and a true random number generator.
0 employs its own cryptographically strong random number generator and a powerful combination of symmetric and asymmetric algorithms to encrypt and decrypt archived data.
Its efficiency is ensured by user authentication on the system start, symmetric encryption for data protection and integrity control, asymmetric algorithms for additional key exchange and digital signatures, checksum control of program modules against tempering, and a personal firewall with preset and custom policies and filters.
Asymmetric algorithms such as RSA, DH and DSS with key lengths up to 4096-bits are supported with a peak performance of 60K 180-bit exponent DH or 40K 1024-bit exponent RSA operations per second.