Skip to content

Public key cryptography algorithms

Public key cryptography algorithms (also known as asymmetric cryptography) are cryptographic systems that use pairs of keys: public keys, which may be disseminated widely, and private keys, which are known only to the owner. This category encompasses standards for encryption, Digital signatures, and key exchange protocols.

Key Algorithms

The following algorithms are recognized implementations of public key cryptography:

  • RSA: One of the earliest and most widely used algorithms for secure data transmission and Digital signatures.
  • DSA (Digital Signature Algorithm): A Federal Information Processing Standard for Digital signatures.
  • ECDSA (Elliptic Curve Digital Signature Algorithm): A variant of DSA that operates on elliptic curve cryptography, offering similar security with smaller key sizes.
  • ECDHE (Elliptic Curve Diffie-Hellman Ephemeral): A key exchange protocol that provides forward secrecy.
  • Ed25519 / X25519: Modern cryptographic algorithms based on twisted Edwards curves (Ed25519 for Digital signatures and X25519 for key exchange).
  • Ed448 / X448: Newer cryptographic schemes offering higher security levels (Ed448 for signatures, X448 for key exchange).
  • Elliptic curve cryptography: A general approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields.
  • Diffie–Hellman key exchange: A specific method of securely exchanging cryptographic keys over a public channel.

Related cryptography primitives and standards often used in conjunction with these algorithms include symmetric ciphers like [[AES]] and hash functions like [[SHA-2]].

Sources

  • openssl.md

title: Public key cryptography algorithms summary: Cryptographic algorithms using key pairs including RSA, DSA, Elliptic Curve (ECDSA, ECDHE), and Edwards-curve variants (Ed25519, X25519). sources: - OpenSSL.md kind: concept tags: - cryptography - security - algorithms confidence: 1 provenanceState: extracted inferredParagraphs: 0