Asymmetric Algorithms

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/4

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:14 PM on 9/12/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

5 Terms

1
New cards

Key exchange over insecure networks (e.g., VPN tunnel setup).

What is Diffie-Hellman used for?

2
New cards

a public-key cryptography method that utilizes the mathematical properties of elliptic curves to provide secure encryption and digital signatures. Common in mobile devices

What is ECC

3
New cards

The difficulty of factoring large prime numbers.

What is RSA based on?

4
New cards

Symmetric uses a single key for encryption/decryption; asymmetric uses two different keys (public & private).

What is the difference between symmetric and asymmetric keys?

5
New cards

RSA, ECC, Diffie Hellman

Whst are they types of Asymmetric algorithms