Developer Guide

  • 04/03/2019
  • Public Content

Public (Asymmetric) Key Cryptography

When public (or asymmetric) key encryption is used, a public key is used for encryption and a private key is used for decryption.  The advantage of asymmetric keys is that they solve the problem of passing the shared key securely.  The disadvantages are that these algorithms are vulnerable to ‘known ciphertext’ attacks and there is still a need for a method to trust the public key.

Product and Performance Information


Intel's compilers may or may not optimize to the same degree for non-Intel microprocessors for optimizations that are not unique to Intel microprocessors. These optimizations include SSE2, SSE3, and SSSE3 instruction sets and other optimizations. Intel does not guarantee the availability, functionality, or effectiveness of any optimization on microprocessors not manufactured by Intel. Microprocessor-dependent optimizations in this product are intended for use with Intel microprocessors. Certain optimizations not specific to Intel microarchitecture are reserved for Intel microprocessors. Please refer to the applicable product User and Reference Guides for more information regarding the specific instruction sets covered by this notice.

Notice revision #20110804