Developer Guide

  • 10/27/2020
  • Public Content
Contents

Public (Asymmetric) Key Cryptography

When public (or asymmetric) key encryption is used, a public key is used for encryption and a private key is used for decryption.  The advantage of asymmetric keys is that they solve the problem of passing the shared key securely.  The disadvantages are that these algorithms are vulnerable to ‘known ciphertext’ attacks and there is still a need for a method to trust the public key.

Product and Performance Information

1

Performance varies by use, configuration and other factors. Learn more at www.Intel.com/PerformanceIndex.