Summary
In this chapter, we analyzed some fundamental topics surrounding asymmetric encryption. In particular, we learned how the discrete logarithm works, as well as how some of the most famous algorithms in asymmetric encryption, such as Diffie-Hellmann, RSA, and ElGamal, work. We also explored an interesting application of RSA related to exchanging sensitive data between two nations. In Chapter 4, Introducing Hash Functions and Digital Signatures, we will learn how to digitally sign these algorithms.
Now that we have learned about the fundamentals of asymmetric encryption, it's time to analyze digital signatures. As you have already seen with PGP, all these topics are very much related to each other.