Tag

public key

0 views collected around this technical thread.

IT Services Circle
IT Services Circle
Aug 22, 2023 · Information Security

Understanding Symmetric and Asymmetric Encryption: Public/Private Keys, AES, and RSA

This article explains the basic concepts of encryption, distinguishes between symmetric and asymmetric methods, describes how public and private keys work, and compares common algorithms such as AES and RSA, highlighting their security properties, performance trade‑offs, and typical use cases.

AESRSAasymmetric
0 likes · 8 min read
Understanding Symmetric and Asymmetric Encryption: Public/Private Keys, AES, and RSA
Tencent Cloud Developer
Tencent Cloud Developer
Mar 6, 2018 · Blockchain

Fundamentals of Cryptography in Bitcoin: Public/Private Keys, Digital Signatures, and Large Integers

Bitcoin’s security relies on proven cryptographic principles—large‑integer public/private key pairs and digital signatures that authenticate transactions locally without exposing secret keys—making brute‑force attacks infeasible and ensuring that only implementation errors, not the mathematics, can compromise the system.

BitcoinBlockchaincryptography
0 likes · 11 min read
Fundamentals of Cryptography in Bitcoin: Public/Private Keys, Digital Signatures, and Large Integers