### Diffie-Hellman

How can two people in a crowded room derive a secret that only the pair know, without revealing the secret to anyone else that might be listening? That is exactly the scenario the Diffie-Hellman Key Exchange… Read More »Diffie-Hellman

How can two people in a crowded room derive a secret that only the pair know, without revealing the secret to anyone else that might be listening? That is exactly the scenario the Diffie-Hellman Key Exchange… Read More »Diffie-Hellman

We’ve established how Asymmetric encryption makes use of two mathematically linked keys: One referred to as the Public Key, and the other referred to as the Private Key. We’ve also established that what one key encrypts,… Read More »Using Asymmetric Keys

The RSA algorithm is the most widely used Asymmetric Encryption algorithm deployed to date. The acronym is derived from the last names of the three mathematicians who created it in 1977: Ron Rivest, Adi Shamir,… Read More »RSA Example

Earlier, we learned that Symmetric encryption is an encryption scheme that uses the same key to encrypt and decrypt. Conversely, Asymmetric encryption, uses different keys to encrypt and decrypt. Lets take a look at a simple example.… Read More »Asymmetric Encryption