Ad blocker interference detected!
Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers
Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.
An asymmetric algorithm is
|“||a cryptographic algorithm using different, mathematically-related keys for encryption and decryption.||”|
|“||[a]n algorithm for performing encipherment or the corresponding decipherment in which the keys used for encipherment and decipherment differ.||”|
"Asymmetric algorithms are poorly suited for encrypting large messages because they are relatively slow. Instead, these algorithms are used to achieve authentication, integrity and non-repudiation, and support confidentiality through key management. Asymmetric algorithms are used to perform three operations: digital signatures, key transport, and key agreement."
- ↑ U.S. Export Administration Regulations, Part 772 (15 C.F.R. §772.1).
- ↑ ITU, "Compendium of Approved ITU-T Security Definitions," at 4 (Feb. 2003 ed.) (full-text).
- ↑ Id.
- ↑ NIST Special Publication 800-32, Introduction to Public Key Technology and the Federal PKI Infrastructure 11 (Feb. 26, 2001) (full-text).