A Review of Asymmetric Cryptography
By Ravi Das
Our last article further examined and finished off the topic of Symmetric Cryptography. Specifically, the following topics were examined: The Caesar Methodology The Types of Cryptographic Attacks Polyalphabetic Encryption Block Ciphers Initialization Vectors Cipher Block Chaining In this article, we now start to examine another Cryptographic Infrastructure, known as “Asymmetric Cryptography.” This is much more complex than that of a Symmetric Cryptographic Infrastructure because it is not just one that is being used, it is two sets of keys which are now being utilized. These are specifically known as the Private Key and the Public Key.