Public-key Encryption

  • Bill Buchanan


Public-key algorithms use a secret element and a public element to their code. One of the main algorithms is RSA. Compared with DES it is relatively slow but it has the advantage that users can choose their own code whenever they need one. The most commonly used public-key cryptosystems are covered in the next sections.


Prime Number Elliptic Curve Encrypt Message Message Block Plaintext Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media Dordrecht 1999

Authors and Affiliations

  • Bill Buchanan
    • 1
  1. 1.Napier UniversityScotland

Personalised recommendations