1/17
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Asymmetric Algorithm
Does not require a shared secret key, often referred to as public key cryptography since their key is considered to be freely and openly available to the public
Digital Signature
A hash digest of a message encrypted with the sender’s private key to let the recipient know the document was created and sent by the person claiming to have sent it
How does asymmetric encryption ensure confidentiality?
Only the receiver can decrypt the message because we encrypted the hash with their public key
How does asymmetric encryption ensure integrity?
The hash of the message
How does asymmetric encryption ensure non-repudiation
Only the sender could encrypt the hash
Common Asymmetric Algorithms
Diffie-Hellman
(RSA) Rivest-Shamir-Adleman
(ECC) Elliptic Curve Cryptographic