Chapter 4. Asymmetric Cryptography

  1. Günter Schäfer

Published Online: 17 MAR 2006

DOI: 10.1002/0470863722.ch4

Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications

Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications

How to Cite

Schäfer, G. (2003) Asymmetric Cryptography, in Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications, John Wiley & Sons, Ltd, Chichester, UK. doi: 10.1002/0470863722.ch4

Author Information

  1. Technische Universität, Berlin, Germany

Publication History

  1. Published Online: 17 MAR 2006
  2. Published Print: 30 DEC 2003

ISBN Information

Print ISBN: 9780470863701

Online ISBN: 9780470863725

SEARCH

Keywords:

  • asymmetric cryptography;
  • Diffie–Hellman key exchange;
  • integer-factorisation problem;
  • Chinese remainder theorem;
  • RSA algorithm;
  • Square and Multiply algorithm;
  • ElGamal algorithm;
  • cryptographic hash value;
  • Abelian group

Summary

This chapter contains sections titled:

  • Basic Idea of Asymmetric Cryptography

  • Mathematical Principles

  • The RSA Algorithm

  • The Problem of the Discrete Logarithm

  • The Diffie–Hellman Key Exchange Algorithm

  • The ElGamal Algorithm

  • Security of Asymmetric Cryptographic Schemes

  • Summary

  • Supplemental Reading

  • Exercises