Tuesday, November 28, 2017

The algorithm IS the public key

In asymmetric cryptography, the algorithm itself can be considered to constitute a (possibly reusable) portion of the public key. By designing in such a manner, we can create future-proof systems which are agnostic of cryptographic algorithm selection.
In symmetric cryptography, the algorithm may be considered a part of the private key (but perhaps Kerckoffs's principle is still worth respect.)

No comments:

Post a Comment

Blockchain animation

Blockchain technology offers society a new capability: sharing business records whose tamper resistance can be trusted more, and for a lo...