Dreamstime_photosampler_59880277
dreamstime_photosampler_59880277
100269668 © Ronstik | Dreamstime.com
promo_100269668__ronstik__dreamstime
Irina Toloknovskaia, Dreamstime.com
Circuit Diagram51965608 © Irina Toloknovskaia Dreamstime
ID 122748715 - Design © Everythingpossible - Dreamstime.com
Planner manipulating chart
ID 340558606 - Ai © Yulia Gapeenko - Dreamstime.com
promo__id_340558606__ai__yulia_gapeenko__dreamstim
Dreamstime_thekaikoro_137795256
dreamstime_thekaikoro_137795256_promo
Chapter3 631b677046af6

Cryptographic Algorithms (Download)

Sept. 9, 2022
Download the PDF of the third chapter of the “The Cryptography Handbook,”which delves into how modern cryptographic algorithms are implemented.

Check out the other chapters in the Communication Series:  The Cryptography Handbook

In this chapter, we will look at specific implementation details of the most common cryptographic algorithms. It starts with the fundamental XOR function and then discusses the more complex symmetric and asymmetric algorithms in use today.

The chapter concludes with a review of how an asymmetric key algorithm can be used to exchange a shared private key. This enables the use of faster symmetric key algorithms to exchange bulk-encrypted data without developing elaborate key exchange systems.

Comments

To join the conversation, and become an exclusive member of Electronic Design, create an account today!