Cryptographic Algorithms (Download)

Download the PDF of the third chapter of the “The Cryptography Handbook,”which delves into how modern cryptographic algorithms are implemented.
Sept. 9, 2022

Check out the other chapters in the Communication Series:  The Cryptography Handbook

In this chapter, we will look at specific implementation details of the most common cryptographic algorithms. It starts with the fundamental XOR function and then discusses the more complex symmetric and asymmetric algorithms in use today.

The chapter concludes with a review of how an asymmetric key algorithm can be used to exchange a shared private key. This enables the use of faster symmetric key algorithms to exchange bulk-encrypted data without developing elaborate key exchange systems.

Sign up for Electronic Design Newsletters
Get the latest news and updates.