Asymmetric key cryptography/Related Articles
From Citizendium, the Citizens' Compendium
- See also changes related to Asymmetric key cryptography, or pages that link to Asymmetric key cryptography or to this page or whose text .
- Cryptography : A field at the intersection of mathematics and computer science that is concerned with the security of information, typically the confidentiality, integrity and authenticity of some message.
- Symmetric key cryptography : A cryptographic system in which there is only one key; the same secret key is used for encryption and decryption.
- Diffie-Hellman : A technique that allows two parties to safely establish a shared secret for use as a cryptographic key, even if someone is eavesdropping on their interaction. It requires that the parties have some means of authentication to be sure they are talking to the right person.
- RSA algorithm : A widely used public key encryption algorithm whose strength depends on the difficulty of integer factorisation.
- Digital signature : A technique based on public key cryptography to allow people to "sign" documents using their private keys.
- Hybrid cryptosystem : A system that combines public key with secret key methods; usually with a cryptographic hash for authentication as well.
- Public key infrastructure : The set of mechanisms that make public key cryptography operationally usable, concentrating on trusted mechanisms to store new public keys, make them accessible to authorized users, and verify the keys' validity including the absence of administrative revocation
- Computational complexity theory : Add brief definition or description
- Modular arithmetic : Form of arithmetic dealing with integers in which all numbers having the same remainder when divided by a whole number are considered equivalent.
- Number theory : The study of integers and relations between them.