A Review of Asymmetric Cryptography

By Ravi Das

Our last article further examined and finished off the topic of Symmetric Cryptography. Specifically, the following topics were examined: The Caesar Methodology The Types of Cryptographic Attacks Polyalphabetic Encryption Block Ciphers Initialization Vectors Cipher Block Chaining In this article, we now start to examine another Cryptographic Infrastructure, known as “Asymmetric Cryptography.” This is much more complex than that of a Symmetric Cryptographic Infrastructure because it is not just one that is being used, it is two sets of keys which are now being utilized. These are specifically known as the Private Key and the Public Key.

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *