Public-key Cryptography - Examples

Examples

Examples of well-regarded asymmetric key techniques for varied purposes include:

  • Diffie–Hellman key exchange protocol
  • DSS (Digital Signature Standard), which incorporates the Digital Signature Algorithm
  • ElGamal
  • Various elliptic curve techniques
  • Various password-authenticated key agreement techniques
  • Paillier cryptosystem
  • RSA encryption algorithm (PKCS#1)
  • Cramer–Shoup cryptosystem

Examples of asymmetric key algorithms not widely adopted include:

  • NTRUEncrypt cryptosystem
  • McEliece cryptosystem

Examples of notable - yet insecure - asymmetric key algorithms include:

  • Merkle–Hellman knapsack cryptosystem

Examples of protocols using asymmetric key algorithms include:

  • GPG, an implementation of OpenPGP
  • Internet Key Exchange
  • PGP
  • ZRTP, a secure VoIP protocol
  • Secure Socket Layer, now codified as the IETF standard Transport Layer Security (TLS)
  • SILC
  • SSH
  • Bitcoin

Read more about this topic:  Public-key Cryptography

Famous quotes containing the word examples:

    No rules exist, and examples are simply life-savers answering the appeals of rules making vain attempts to exist.
    André Breton (1896–1966)

    It is hardly to be believed how spiritual reflections when mixed with a little physics can hold people’s attention and give them a livelier idea of God than do the often ill-applied examples of his wrath.
    —G.C. (Georg Christoph)

    In the examples that I here bring in of what I have [read], heard, done or said, I have refrained from daring to alter even the smallest and most indifferent circumstances. My conscience falsifies not an iota; for my knowledge I cannot answer.
    Michel de Montaigne (1533–1592)