Latest from Embedded

ID 83317721 © Igor Zakharevich | Dreamstime.com
supplychain_dreamstime_l_83317721
ID 144516710 © vladimir timofeev | Dreamstime.com
Data Center
ID 5549870 © Artistar | Dreamstime.com
hard_drive_dreamstime_l_5549870
ID 144516710 © vladimir timofeev | Dreamstime.com
Data Center
ID 117103442 © Monsit Jangariyawong | Dreamstime.com
ai_dreamstime_l_117103442
Dreamstime_Christopher-Myers_57292769
dreamstime_christophermyers_57292769
ID 53192827 © Serhii Neznamov | Dreamstime.com
powersupply_dreamstime_l_53192827
Chapter2 6308f936150f3

Cryptographic Fundamentals (Download)

Aug. 26, 2022
Download the PDF of the second chapter of the “The Cryptography Handbook,”which discusses the fundamental concepts behind modern cryptography.

Check out the other chapters in the Communication Series:  The Cryptography Handbook

The security of cryptographic applications critically relies on symmetric keys and private keys that are continually kept secret. The method used to keep them secret is also protected.

Two basic types of algorithms are used in modern cryptography—asymmetric key and symmetric key. Asymmetric-key algorithms use a combination of private and public keys while symmetric algorithms use only private ones, commonly referred to as secret keys. The table in the article provides a snapshot of the main features of each algorithmic method.