Public-Key Algorithms
Public-key (asymmetric) algorithms use two different keys: the
public key and the
private key. The private key is kept private to the owner of the key pair, and the public
key can be distributed to anyone who requests it. If one key is used to
encrypt a message, then the other key is required to decrypt the message.
Public-key algorithms are very slow, on the order of 1000 times slower than
symmetric algorithms. Consequently, they are normally used only to encrypt
session keys. They are also used to digitally sign messages, as discussed in the next
section.
One of the most common public-key algorithms is the RSA Public-Key Cipher.
- Software for developers
-
Delphi Components
.Net Components
Software for Android Developers
- More information resources
-
MegaDetailed.Net
Unix Manual Pages
Delphi Examples
- Databases for Amazon shops developers
-
Amazon Categories Database
Browse Nodes Database