Read this whole guide offline with no ads, for a low price!
Click Here!
Use coupon code "certiguide" to save 20%!
(Expires 2004/12/31)

Need more practice? 300 additional Security+ questions!
Get It Here!

Custom Search







Table Of Contents  CertiGuide to Security+
 9  Chapter 4:  Basics of Cryptography (Domain 4.0; 15%)
      9  4.1  Algorithms
           9  4.1.3  Asymmetric

Previous Topic/Section
4.1.3  Asymmetric
Previous Page
Pages in Current Topic/Section
1
Next Page
How is Asymmetric Cryptography Used?
Next Topic/Section

Asymmetric Cryptography Algorithms

Diffie and Hellman originally discussed asymmetric cryptography, in their 1976 paper about a new, secure way to exchange secret keys between users.392 The Diffie-Hellman key exchange protocol solved the problem of securely communicating symmetric algorithm key information to those users who need it by using a new type of cryptography.

Perhaps the most widely used asymmetric commercial algorithm at this time is RSA (developed by Rivest, Shamir, and Adleman in 1977), by RSA Data Security, Inc. Others include DSA (used by the government)

Popular examples of Public/Private key cryptography include PGP (Pretty Good Privacy, with versions using RSA and Diffie-Hellman keys), S/MIME, SSH (the secure alternative to telnet) and SSL (used for encryption of data between a web browser and server).393

Asymmetric Sez Thanks To...

Asymmetric cryptography was pioneered by Diffie and Hellman in 1976, in their paper on the Diffie-Hellman Key Exchange Algorithm, which described the use of public/private key cryptography to securely pass a secret key between authorized parties.

RSA, developed by Rivest, Shamir and Adleman in 1977, is the most widely used commercial asymmetric algorithm.

PGP, S/MIME, SSH and SSL usually use public/private key encryption.



 __________________

392. W. Diffie and M.E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory 22 (1976), 644-654.

393. Prakash, Vipul Ved and Benjamin Trott, “Asymmetric Cryptography in Perl”, http://www.perl.com/pub/a/2001/09/26/crypto1.html?page=1

Previous Topic/Section
4.1.3  Asymmetric
Previous Page
Pages in Current Topic/Section
1
Next Page
How is Asymmetric Cryptography Used?
Next Topic/Section

If you find CertiGuide.com useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Security+ from StudyExam4Less.com. (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $



Home - Table Of Contents - Contact Us

CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004

Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.