Public-key Encryption

  • Bill Buchanan


Public-key algorithms use a secret element and a public element to their code. One of the main algorithms is RSA. Compared with DES it is relatively slow but it has the advantage that users can choose their own code whenever they need one. The most commonly used public-key cryptosystems are covered in the next sections.


Prime Number Elliptic Curve Encrypt Message Message Block Plaintext Attack 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media Dordrecht 1999

Authors and Affiliations

  • Bill Buchanan
    • 1
  1. 1.Napier UniversityScotland

Personalised recommendations