正在加载图片...
Public-Key applications can classify uses into 3 categories encryption/decryption(provide secrecy) digital signatures(provide authentication) key exchange(of session keys) some algorithms are suitable for all uses others are specific to one. only three algorithms work well for both encryption and digital signatures: rSA, ElGamal, and Rabin. All of these algorith ms are slow3 Public-Key Applications • can classify uses into 3 categories: – encryption/decryption (provide secrecy) – digital signatures (provide authentication) – key exchange (of session keys) • some algorithms are suitable for all uses, others are specific to one. Only three algorithms work well for both encryption and digital signatures: RSA, ElGamal, and Rabin. All of these algorithms are slow
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有