官术网_书友最值得收藏!

4 Public Key Cryptography

In this chapter, you will be introduced to the concepts and practical aspects of public key cryptography, also called asymmetric cryptography or asymmetric key cryptography. We will continue to use OpenSSL, as we did in the previous chapter, to experiment with some applications of cryptographic algorithms so that you can gain hands-on experience. We will start with the theoretical foundations of public key cryptography and will gradually build on the concepts with relevant practical exercises. After this, we will introduce some new and advanced cryptography constructs.

Before discussing cryptography further, some mathematical terms and concepts need to be explained in order to build a foundation for fully understanding the material provided later in this chapter. The next section serves as a basic introduction to these concepts. An explanation with proofs and relevant background for all of these terms would require somewhat complex mathematics, which is beyond the scope of this book. More details on these topics can be found in any standard number theory, algebra, or cryptography book.

主站蜘蛛池模板: 鄢陵县| 合江县| 富平县| 镇雄县| 漳州市| 噶尔县| 西乌珠穆沁旗| 天门市| 买车| 登封市| 襄樊市| 江口县| 靖州| 铁岭县| 德化县| 铅山县| 丰城市| 新干县| 连城县| 东阳市| 兴和县| 海林市| 文水县| 绥江县| 万载县| 信宜市| 江山市| 印江| 罗平县| 安吉县| 阿尔山市| 雷州市| 呼伦贝尔市| 龙游县| 高雄县| 英山县| 吴堡县| 林口县| 金山区| 沭阳县| 高雄市|