RSA involves a public key and private key. The public key can be known to everyone; it is used to encrypt messages. Messages encrypted using the public key can only be decrypted with the private key. The keys for the RSA algorithm are generated the following way: Choose two different large random prime numbers {\displaystyle p\,}
pragya@21
2018-12-05
00
1
elgamal encryption
no vote
In cryptography , the ElGamal encryption system is an asymmetric key encryption algorithm for
Let and be positive integers which are relatively prime and let
pragya@21
2018-06-11
00
1
diffie hellman
no vote
The Diffie-Hellman protocol is a method for two computer users to generate a shared private key with which they can then exchange information across an insecure channel. Let the users be named Alice and Bob. First, they agree on two prime numbers and , where is large (typically at least 512 bits) and
pragya@21
2018-05-17
00
1
shift cipher
no vote
In cryptography , a Caesar cipher , also known as Caesar's cipher , the