1/3
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Key exchange over insecure networks (e.g., VPN tunnel setup).
What is Diffie-Hellman used for?
a public-key cryptography method that utilizes the mathematical properties of elliptic curves to provide secure encryption and digital signatures. Common in mobile devices
What is ECC
The difficulty of factoring large prime numbers.
What is RSA based on?
Symmetric uses a single key for encryption/decryption; asymmetric uses two different keys (public & private).
What is the difference between symmetric and asymmetric keys?