slides/encryption/asymmetric.xml
Asymmetric ciphers
8/29
Quote
Hash algorithms


  • • Key to encrypt is different as the key to decrypt
  • • ElGamal, Diffie Hellman, RSA
  • • Used for signatures and key distribution