Asymmetric key cryptography/Related Articles: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Daniel Mietchen
m (Robot: encapsulating subpages template in noinclude tag)
No edit summary
 
(10 intermediate revisions by 2 users not shown)
Line 2: Line 2:


==Parent topics==
==Parent topics==
{{r|Cryptography}}


== Sibling topic ==


==Subtopics==
{{r|Symmetric key cryptography}}


==Techniques==
{{r|Diffie-Hellman}}
{{r|RSA algorithm}}


==Other related topics==
== Applications ==


{{r|Digital signature}}
{{r|Hybrid cryptosystem}}
{{r|Public key infrastructure}}


<!-- Remove the section below after copying links to the other sections. -->
==Other related topics==
==Bot-suggested topics==
Auto-populated based on [[Special:WhatLinksHere/Asymmetric key cryptography]]. Needs checking by a human.


{{r|Computational complexity theory}}
{{r|Computational complexity theory}}
{{r|Cryptography}}
{{r|Diffie-Hellman}}
{{r|Digital signature}}
{{r|Hybrid cryptosystem}}
{{r|Modular arithmetic}}
{{r|Modular arithmetic}}
{{r|Number theory}}
{{r|Number theory}}
{{r|Public key infrastructure}}
==Articles related by keyphrases (Bot populated)==
{{r|Public}}
{{r|Hybrid cryptosystem}}
{{r|RSA}}
{{r|Digital signature}}
{{r|Symmetric key cryptography}}
{{r|Diffie-Hellman}}
 
{{r|Cryptographic key}}
[[Category:Bot-created Related Articles subpages]]
<!-- Remove the section above after copying links to the other sections. -->

Latest revision as of 07:00, 14 July 2024

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Asymmetric key cryptography.
See also changes related to Asymmetric key cryptography, or pages that link to Asymmetric key cryptography or to this page or whose text contains "Asymmetric key cryptography".

Parent topics

Sibling topic

  • Symmetric key cryptography [r]: A cryptographic system in which there is only one key; the same secret key is used for encryption and decryption. [e]

Techniques

  • Diffie-Hellman [r]: A technique that allows two parties to safely establish a shared secret for use as a cryptographic key, even if someone is eavesdropping on their interaction. It requires that the parties have some means of authentication to be sure they are talking to the right person. [e]
  • RSA algorithm [r]: A widely used public key encryption algorithm whose strength depends on the difficulty of integer factorisation. [e]

Applications

Other related topics

Articles related by keyphrases (Bot populated)

  • Hybrid cryptosystem [r]: A system that combines public key with secret key methods; usually with a cryptographic hash for authentication as well. [e]
  • Digital signature [r]: A technique based on public key cryptography to allow people to "sign" documents using their private keys. [e]
  • Diffie-Hellman [r]: A technique that allows two parties to safely establish a shared secret for use as a cryptographic key, even if someone is eavesdropping on their interaction. It requires that the parties have some means of authentication to be sure they are talking to the right person. [e]
  • Cryptographic key [r]: Value used by a computer together with a complex algorithm to encrypt and decrypt messages. [e]