Abstract
Public-key algorithms use a secret element and a public element to their code. One of the main algorithms is RSA. Compared with DES it is relatively slow but it has the advantage that users can choose their own code whenever they need one. The most commonly used public-key cryptosystems are covered in the next sections.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Buchanan, B. (1999). Public-key Encryption. In: Handbook of Data Communications and Networks. Springer, Boston, MA. https://doi.org/10.1007/978-1-4757-0905-6_17
Download citation
DOI: https://doi.org/10.1007/978-1-4757-0905-6_17
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-0907-0
Online ISBN: 978-1-4757-0905-6
eBook Packages: Springer Book Archive