| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Asymmetric Cryptography Algorithms Diffie and Hellman originally discussed asymmetric cryptography, in their 1976 paper about a new, secure way to exchange secret keys between users.392 The Diffie-Hellman key exchange protocol solved the problem of securely communicating symmetric algorithm key information to those users who need it by using a new type of cryptography. Perhaps the most widely used asymmetric commercial algorithm at this time is RSA (developed by Rivest, Shamir, and Adleman in 1977), by RSA Data Security, Inc. Others include DSA (used by the government) Popular examples of Public/Private key cryptography include PGP (Pretty Good Privacy, with versions using RSA and Diffie-Hellman keys), S/MIME, SSH (the secure alternative to telnet) and SSL (used for encryption of data between a web browser and server).393
__________________ 392. W. Diffie and M.E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory 22 (1976), 644-654. 393. Prakash, Vipul Ved and Benjamin Trott, Asymmetric Cryptography in Perl, http://www.perl.com/pub/a/2001/09/26/crypto1.html?page=1
Home - Table Of Contents - Contact Us CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com Version 1.0 - Version Date: November 15, 2004 Adapted with permission from a work created by Tcat Houser et al. CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved. Not responsible for any loss resulting from the use of this site. |