Public-key Cryptography - Examples

Examples

Examples of well-regarded asymmetric key techniques for varied purposes include:

  • Diffie–Hellman key exchange protocol
  • DSS (Digital Signature Standard), which incorporates the Digital Signature Algorithm
  • ElGamal
  • Various elliptic curve techniques
  • Various password-authenticated key agreement techniques
  • Paillier cryptosystem
  • RSA encryption algorithm (PKCS#1)
  • Cramer–Shoup cryptosystem

Examples of asymmetric key algorithms not widely adopted include:

  • NTRUEncrypt cryptosystem
  • McEliece cryptosystem

Examples of notable - yet insecure - asymmetric key algorithms include:

  • Merkle–Hellman knapsack cryptosystem

Examples of protocols using asymmetric key algorithms include:

  • GPG, an implementation of OpenPGP
  • Internet Key Exchange
  • PGP
  • ZRTP, a secure VoIP protocol
  • Secure Socket Layer, now codified as the IETF standard Transport Layer Security (TLS)
  • SILC
  • SSH
  • Bitcoin

Read more about this topic:  Public-key Cryptography

Famous quotes containing the word examples:

    No rules exist, and examples are simply life-savers answering the appeals of rules making vain attempts to exist.
    André Breton (1896–1966)

    There are many examples of women that have excelled in learning, and even in war, but this is no reason we should bring ‘em all up to Latin and Greek or else military discipline, instead of needle-work and housewifry.
    Bernard Mandeville (1670–1733)

    It is hardly to be believed how spiritual reflections when mixed with a little physics can hold people’s attention and give them a livelier idea of God than do the often ill-applied examples of his wrath.
    —G.C. (Georg Christoph)