Asymmetric Encryption Algorithms
Asymmetric encryption involves using different pairs of keys to encrypt and decrypt a message. A synonym of asymmetric encryption is public/private key encryption, but there are some differences between asymmetric and public/private key encryption, which we will discover in this chapter. Starting with a little bit of history of this revolutionary method of encryption/decryption, we will look at different types of asymmetric algorithms and how they help secure our credit cards, identity, and data.
In this chapter, we are going to cover the following topics:
- Public/private key and asymmetric encryption
- The Diffie-Hellman key exchange and the related man-in-the-middle problem
- RSA and an interesting application for international threats
- Introduction to conventional and unconventional attacks on RSA
- Pretty Good Privacy (PGP)
- ElGamal and its possible vulnerabilities
Let’s dive in!