public-key cryptography

(redirected from Asymmetric key algorithm)

public-key cryptography

This article is provided by FOLDOC - Free Online Dictionary of Computing (foldoc.org)
References in periodicals archive ?
These include symmetric and asymmetric key algorithms, but asymmetric key algorithms are inappropriate for resource-constrained devices for several reasons, including the limited storage space and excessive energy usage [1, 2].
Among the topics are the basics of security and cryptography, block cipher, the data encryption standard, asymmetric key algorithms, elliptic curve cryptography, the secure hash algorithm, fundamentals of identity-based cryptography, and symmetric key encryption acceleration on heterogeneous many-core architectures.
The article also stimulated the birth of a new class of enciphering algorithms, the asymmetric key algorithms. Before that, all useful modern encryption algorithms had been symmetric key algorithms, in which the same cryptographic key is used with the underlying algorithm by both the sender and the recipient, who must both keep it secret.
As for asymmetric key algorithms like RSA, the computational cost involved is more prohibitive than symmetric key encryption algorithms.

Full browser ?