Public-key (asymmetric) algorithms use two different keys: the public key
and the private key
. The private key is kept private to the owner of the key pair, and the public
key can be distributed to anyone who requests it. If one key is used to
encrypt a message, then the other key is required to decrypt the message.
Public-key algorithms are very slow, on the order of 1000 times slower than
symmetric algorithms. Consequently, they are normally used only to encrypt
session keys. They are also used to digitally sign messages, as discussed in the next
One of the most common public-key algorithms is the RSA Public-Key Cipher.
- Software for developers
Software for Android Developers
- More information resources
Unix Manual Pages
- Databases for Amazon shops developers
Amazon Categories Database
Browse Nodes Database