Summary
In this chapter, we analyzed some fundamental topics surrounding asymmetric encryption. In particular, we learned how the discrete logarithm works, as well as how some of the most famous algorithms in asymmetric encryption, such as Diffie-Hellman, RSA, and ElGamal, work. We also explored an interesting application of RSA related to exchanging sensitive data between two nations. In Chapter 4, Hash Functions and Digital Signatures, we will learn how to digitally sign these algorithms.
Now that we have learned about the fundamentals of asymmetric encryption, it’s time to analyze digital signatures. As you have already seen with PGP, all these topics are very much related to each other.
Join us on Discord!
Read this book alongside other users. Ask questions, provide solutions to other readers, and much more.
Scan the QR code or visit the link to join the community.
https://packt.link/SecNet