Asymmetric Algorithms

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/3

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

4 Terms

1
New cards

Key exchange over insecure networks (e.g., VPN tunnel setup).

What is Diffie-Hellman used for?

2
New cards

a public-key cryptography method that utilizes the mathematical properties of elliptic curves to provide secure encryption and digital signatures. Common in mobile devices

What is ECC

3
New cards

The difficulty of factoring large prime numbers.

What is RSA based on?

4
New cards

Symmetric uses a single key for encryption/decryption; asymmetric uses two different keys (public & private).

What is the difference between symmetric and asymmetric keys?