Latest from Embedded

ID 217230663 © Christian Offenberg - Dreamstime.com | electronica.de
promo_messe_munich__id_217230663__christian_offenb
ID 169214712 © Petrsvoboda91 | Dreamstime.com
Focus at SSD slot, type M.2 with support for NVMe, on computer motherboard.
ID 321264446 © Studioclever | Dreamstime.com
Generative AI in the data center
Sparkfun, Mikroe, Digilent, Digi International
Peripheral modules with popular form factors
ID 105492920 © Feblacal | Dreamstime.com
CAD modeling
id_9143019__kiosk88__Dreamstime
Circuit board design
Chapter2 6308f936150f3

Cryptographic Fundamentals (Download)

Aug. 26, 2022
Download the PDF of the second chapter of the “The Cryptography Handbook,”which discusses the fundamental concepts behind modern cryptography.

Check out the other chapters in the Communication Series:  The Cryptography Handbook

The security of cryptographic applications critically relies on symmetric keys and private keys that are continually kept secret. The method used to keep them secret is also protected.

Two basic types of algorithms are used in modern cryptography—asymmetric key and symmetric key. Asymmetric-key algorithms use a combination of private and public keys while symmetric algorithms use only private ones, commonly referred to as secret keys. The table in the article provides a snapshot of the main features of each algorithmic method.

Comments

To join the conversation, and become an exclusive member of Electronic Design, create an account today!