Cryptography Asymmetric Algorithms Flashcards
What Asymmetric cipher Leverages prime number characteristics, has a 1024-4096 bit variable key size, and uses 1 round
Note:Most Popular / provides authentication and encryption / authentication through digital signatures
RSA
What Asymmetric cipher Leverages discrete logarithm characteristics Note: provides authentication and encryption/ faster than RSA / Uses less resources than RSA (Used in smaller devices like smartphones) / authentication through digital signatures
ECC
Used in recent versions of PGP Note:Extension of Diffie Hellman (DH)/ Similar level of protection as RSA and ECC/ usually the slowest
El Gamal
A Federal Information Processing Standard for digital signatures (FIPS 186)
DSA
No Authentication /vulnerable to Man in the middle attacks
Diffie Hellman (DH)