This chapter presents an asymmetric approach to cryptography - it uses different keys for encryption and decryption. The key for encryption is announced publically so that everybody can encode a message. Only the owner of the matching secret key can decode the encrypted message. Most cryptographic schemes used today in the Internet are based on asymmetric algorithms using a secret and a public key. © 2011 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Bongartz, D., & Unger, W. (2011). Public-key cryptography. In Algorithms Unplugged (pp. 147–158). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-15328-0_16
Mendeley helps you to discover research relevant for your work.