# public-key cryptography

(redirected from Asymmetric algorithm)

## public-key cryptography

References in periodicals archive ?
RSA (Rivest-Shamir-Adleman) is the most widely used asymmetric algorithm where a pair of keys (one public and one private) are used.
1: Symmetric algorithm Vs Asymmetric algorithm Symmetric Encryption Asymmetric Encryption Functionality Allows efficient Enables security in communication between two settings in which parties in a closed symmetric encryption environment.
Seen from the previous section, the cryptographic library can basically perform the following functions: Symmetric algorithm, Asymmetric algorithm, Hash algorithm, MAC (Message Authentication Code), HMAC (Hash-based Message Authentication Code), CMAC (Cipher-based Message Authentication Code), key Derive, SSL, TLS, PGP, cryptographic key management, certificate, random number, ASN.1, pem, BASE64 and PKCS (The Public-Key Cryptography Standards).
The security scheme proposed in this paper addresses the need to protect the data confidentiality, integrity and authenticity by means of symmetric cryptographic algorithms, since the keys for these algorithms are smaller than those of an asymmetric algorithm with the purpose of obtaining the same level of security requiring less time to process information.
The idea is to study the protection techniques like DES algorithm, AES cipher(Symmetric Algorithm) and RSA algorithm (Asymmetric Algorithm) to protect the data.
The Paillier cryptosystem is a probabilistic asymmetric algorithm for public key cryptography and the algorithm works as follows.
symmetric algorithm and asymmetric algorithm. Illustration is shown in Figure 3 and described as follow:
Symmetric key algorithms make use of shorter keys in comparison with the keys used by asymmetric algorithms such as RSA (Rivest, Shamir and Adleman), ElGamal or Elliptic Curve Cryptography (ECC) [1].
Because of computational complexity, the asymmetric algorithms are typically used to provide the services like authentication, key exchange, and digital signature.
Asymmetric algorithms use different values for encryption and decryption and do not need to share secret between two parties.
Asymmetric Algorithms http://www.suse.de/~garloff/Writings/mutt_gpg/node3.html Accessed on 2010-05-12 Tab.
[5] Jacques Patarin, "Hidden Field Equations and Isomorphism of Polynomials two new families of Asymmetric Algorithms", Eurocrypt'96, Springer Verlag, pp.33-48

Site: Follow: Share:
Open / Close