|
- RSA cryptosystem - Wikipedia
RSA cryptosystem The RSA (Rivest–Shamir–Adleman) cryptosystem is a family of public-key cryptosystems, one of the oldest widely used for secure data transmission
- Merkle–Hellman knapsack cryptosystem - Wikipedia
Merkle–Hellman is a public key cryptosystem, meaning that two keys are used, a public key for encryption and a private key for decryption It is based on the subset sum problem (a special case of the knapsack problem) [5] The problem is as follows: given a set of integers and an integer , find a subset of which sums to In general, this problem is known to be NP-complete However, if is
- List of cryptosystems - Wikipedia
Public-key cryptosystems use a public key for encryption and a private key for decryption Diffie–Hellman key exchange RSA encryption Rabin cryptosystem Schnorr signature ElGamal encryption Elliptic-curve cryptography Lattice-based cryptography McEliece cryptosystem Multivariate cryptography Isogeny-based cryptography
- McEliece cryptosystem - Wikipedia
McEliece consists of three algorithms: a probabilistic key generation algorithm that produces a public and a private key, a probabilistic encryption algorithm, and a deterministic decryption algorithm All users in a McEliece deployment share a set of common security parameters:
- Key encapsulation mechanism - Wikipedia
In cryptography, a key encapsulation mechanism (KEM) is a public-key cryptosystem that allows a sender to generate a short secret key and transmit it to a receiver confidentially, in spite of eavesdropping and intercepting adversaries [1][2][3] Modern standards for public-key encryption of arbitrary messages are usually based on KEMs [4][5]
- ElGamal encryption - Wikipedia
Like most public key systems, the ElGamal cryptosystem is usually used as part of a hybrid cryptosystem, where the message itself is encrypted using a symmetric cryptosystem, and ElGamal is then used to encrypt only the symmetric key This is because asymmetric cryptosystems like ElGamal are usually slower than symmetric ones for the same level of security, so it is faster to encrypt the
- Category:Public-key encryption schemes - Wikipedia
Goldwasser–Micali cryptosystem H Hidden Field Equations K Key encapsulation mechanism M McEliece cryptosystem Merkle–Hellman knapsack cryptosystem N Naccache–Stern cryptosystem Naccache–Stern knapsack cryptosystem Niederreiter cryptosystem NTRUEncrypt O Okamoto–Uchiyama cryptosystem Optimal asymmetric encryption padding P Paillier
- Public key infrastructure - Wikipedia
Public-key cryptography is a cryptographic technique that enables entities to securely communicate on an insecure public network, and reliably verify the identity of an entity via digital signatures [7] A public key infrastructure (PKI) is a system for the creation, storage, and distribution of digital certificates, which are used to verify that a particular public key belongs to a certain
|
|
|