Asymmetric Encryption

  • Stohrer C
  • Lugrin T
1Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

An asymmetric encryption scheme uses two different keys, a private one and a public one. While the public key is used for encryption and may be known by others, the private key is used for decryption and must be kept secret. The widespread public critical systems are based on the integer factorization problem or the discrete logarithm problem over finite fields and elliptic curve. The minimal key length and the required size of the involved parameters should be chosen according to the current regulation or best practice advice. Current public cryptosystems are considered secure against classical computers, but most of those commonly used today will be broken by attacks from not yet existing powerful quantum computers.

Cite

CITATION STYLE

APA

Stohrer, C., & Lugrin, T. (2023). Asymmetric Encryption. In Trends in Data Protection and Encryption Technologies (pp. 11–14). Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-33386-6_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free