asymmetric cryptography

asymmetric cryptography
cryptography in which the key used in decryption is different from that used for encryption.

One advantage of asymmetric cryptography is that you can exchange data without sharing the ability to read it.


Wikipedia foundation.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption …   Wikipedia

  • asymmetric cypher — kriptografija viešuoju raktu statusas T sritis informatika apibrėžtis Metodų ir standartų rinkinys, leidžiantis subjektui (žmogui, organizacijai, aparatinei arba programinei įrangai) elektroniškai paliudyti savo tapatumą arba pasirašyti ir… …   Enciklopedinis kompiuterijos žodynas

  • Cryptography Classification — Classification of Cryptographic Systems, Ciphers, Algorithms1. This classification scheme has to do with the means of implementation 1.1. Classical : Pre Computer Era involvements of (e.g. before 1950) 1.2. Modern : Computer Era. Usually implies… …   Wikipedia

  • Elliptic Curve Cryptography — Elliptische Kurve über Unter Elliptic Curve Cryptography (ECC) oder deutsch Elliptische Kurven Kryptographie versteht man asymmetrische Kryptosysteme, die Operationen auf elliptischen Kurven über endlichen Körpern v …   Deutsch Wikipedia

  • Trace Zero Cryptography — In the year 1998 Gerhard Frey firstly purposed using trace zero varieties for cryptographic purpose. These varieties are subgroups of the divisor class group on a low genus hyperelliptic curve defined over a finite field. These groups can be used …   Wikipedia

  • public-key cryptography — noun A form of cryptography which allows users to communicate securely without previously agreeing on a shared secret key (abbreviation PKC) Syn: asymmetric cryptography, public key encryption …   Wiktionary

  • Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key …   Wikipedia

  • History of cryptography — The history of cryptography begins thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In… …   Wikipedia

  • Outline of cryptography — See also: Index of cryptography articles The following outline is provided as an overview of and topical guide to cryptography: Cryptography (or cryptology) – practice and study of hiding information. Modern cryptography intersects the… …   Wikipedia

  • Topics in cryptography — This article is intended to be an analytic glossary , or alternatively, an organized collection of annotated pointers.Classical ciphers*Autokey cipher *Permutation cipher*Polyalphabetic substitution **Vigenère cipher*Polygraphic substitution… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”