British GCHQ (now NCSC) introduced the public key cryptography concept. A third party (CA) is responsible for key creation and distribution. This makes key exchange convenient.
Fig. Public Key Cryptography
RSA public key encryption is based on two large prime numbers. Factor the product of those numbers seems simple but requires tremendous amount of time, or in many cases important.
Since public key algorithms such as RSA require complex computations, it is slow. As a result, people usually do not use it directly for encrypting message (a large amount of data). Instead, use it to exchange short session keys for secret key algorithms (aka symmetric algorithms) such as AES.
Note:
Image copyright: Author of this post. Free to use but reference is required.
Thanks for sharing us. investing
ReplyDeletethose polyurethane inflatable boats are very sturdy and some are kevlar lined too but they are expensive:: antminer dr5 for sale
ReplyDeleteYeah bookmaking this wasn’t a speculative conclusion great post! . innosilicon a11 pro for sale
ReplyDelete