Asymmetric key cryptography/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Housekeeping Bot m (Automated edit: Adding CZ:Workgroups to Category:Bot-created Related Articles subpages) |
imported>Sandy Harris |
||
Line 23: | Line 23: | ||
{{r|Public key infrastructure}} | {{r|Public key infrastructure}} | ||
{{r|Public}} | {{r|Public}} | ||
{{r|RSA}} | {{r|RSA algorithm}} | ||
{{r|Symmetric key cryptography}} | {{r|Symmetric key cryptography}} | ||
{{Bot-created_related_article_subpage}} | {{Bot-created_related_article_subpage}} | ||
<!-- Remove the section above after copying links to the other sections. --> | <!-- Remove the section above after copying links to the other sections. --> |
Revision as of 19:49, 29 July 2010
- See also changes related to Asymmetric key cryptography, or pages that link to Asymmetric key cryptography or to this page or whose text contains "Asymmetric key cryptography".
Parent topics
Subtopics
Bot-suggested topics
Auto-populated based on Special:WhatLinksHere/Asymmetric key cryptography. Needs checking by a human.
- Computational complexity theory [r]: Add brief definition or description
- Cryptography [r]: A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message. [e]
- Diffie-Hellman [r]: A technique that allows two parties to safely establish a shared secret for use as a cryptographic key, even if someone is eavesdropping on their interaction. It requires that the parties have some means of authentication to be sure they are talking to the right person. [e]
- Digital signature [r]: A technique based on public key cryptography to allow people to "sign" documents using their private keys. [e]
- Hybrid cryptosystem [r]: A system that combines public key with secret key methods; usually with a cryptographic hash for authentication as well. [e]
- Modular arithmetic [r]: Form of arithmetic dealing with integers in which all numbers having the same remainder when divided by a whole number are considered equivalent. [e]
- Number theory [r]: The study of integers and relations between them. [e]
- Public key infrastructure [r]: Add brief definition or description
- Public [r]: Shared by, open or available to everyone, well or generally known, universally available or without limit, done or made on behalf of the community as a whole, open to general or unlimited viewing or disclosure, frequented by large numbers of people or for general use, or places generally open or visible to all pertaining to official matters or maintained at taxpayer expense. [e]
- RSA algorithm [r]: A widely used public key encryption algorithm whose strength depends on the difficulty of integer factorisation. [e]
- Symmetric key cryptography [r]: A cryptographic system in which there is only one key; the same secret key is used for encryption and decryption. [e]