An asymmetric algorithm is
|“||a cryptographic algorithm using different, mathematically-related keys for encryption and decryption.||”|
|“||[a]n algorithm for performing encipherment or the corresponding decipherment in which the keys used for encipherment and decipherment differ.||”|
"Asymmetric algorithms are poorly suited for encrypting large messages because they are relatively slow. Instead, these algorithms are used to achieve authentication, integrity and non-repudiation, and support confidentiality through key management. Asymmetric algorithms are used to perform three operations: digital signatures, key transport, and key agreement."
- ↑ U.S. Export Administration Regulations, Part 772 (15 C.F.R. §772.1).
- ↑ ITU, "Compendium of Approved ITU-T Security Definitions," at 4 (Feb. 2003 ed.) (full-text).
- ↑ Id.
- ↑ NIST Special Publication 800-32, Introduction to Public Key Technology and the Federal PKI Infrastructure 11 (Feb. 26, 2001) (full-text).