In asymmetric cryptography, the algorithm itself can be considered to constitute a (possibly reusable) portion of the public key. By designing in such a manner, we can create future-proof systems which are agnostic of cryptographic algorithm selection.

In symmetric cryptography, the algorithm may be considered a part of the private key (but perhaps Kerckoffs's principle is still worth respect.)

## No comments:

## Post a Comment