Tuesday, November 28, 2017

The algorithm IS the public key

In asymmetric cryptography, the algorithm itself can be considered to constitute a (possibly reusable) portion of the public key. By designing in such a manner, we can create future-proof systems which are agnostic of cryptographic algorithm selection.
In symmetric cryptography, the algorithm may be considered a part of the private key (but perhaps Kerckoffs's principle is still worth respect.)

No comments:

Post a Comment

Converting the Lightning Network into an electricity market protocol

(For sake of expediency, the following will be rather dense and presumes some background in both electricity markets and the Lightning Netwo...