Chapter 2 Summary of three asymmetric encryption algorithms: asymmetric encryption algorithms
13.1 DH
- The cornerstone of asymmetric algorithms
- It can only be used for key distribution and cannot be used for data encryption and decryption. Generally, AES is used to encrypt data.
- Key Length: 512 ~ Integer multiple of 64 in 1024
- Both parties have their own key pairs.
13.2. RSA
- The most classic asymmetric encryption algorithm
- It can also be consideredMost usedAsymmetric encryption algorithm
- It can be used for key distribution and data encryption and decryption ("private key encryption, Public Key decryption" and "public key encryption, Private Key decryption ")
- Key Length: 512 ~ 65536 (integer multiple of 64)
- Only the sender has one key pair, or the safer method is: both the sender generates its own key pair, but the difference between the key pair and DH when the key pair is used for encryption and decryption later can be viewed in the previous chapter.
- Used for Digital Signature
13.3. ElGamal
- Foundation of Digital Signature DSA
- The specific implementation methods are only available in BC, which is similar to that of RSA.
- Only the "public key encryption and private key encryption" method is supported (public key encryption is not secure in reality)
- Ciphertext expands exponentially