ASYMMETRIC CRYPTOGRAPHY
- Authors
-
-
Usmonov Faxriddin Sharofiddin o‘g‘li
Author -
Usmonov Fazliddin Sharofiddin o‘g‘li
Author
-
- Keywords:
- Asymmetric cryptography, plaintext, cipher text, public key, private key, encryption, decryption
- Abstract
-
This article provides information on the concept of asymmetric cryptography, its principles of operation and basic algorithms. Asymmetric cryptography is based on the use of two keys – public and private keys-to encrypt and decrypt data. The main advantages of this method are a high level of security, the ability to solve and confirm the problem of key sharing. The article also provides a brief overview of the asymmetric algorithm of the RSA. Asymmetric cryptography is widely used in areas such as internet security, electronic signatures and cryptocurrencies.
- References
-
S.K.Ganiev, A.A.Ganiev, Z.T.Xudoyqulov. Kiberxavfsizlik asoslari: O‘quv qo‘llanma. - Т.: «Aloqachi», 2020
S.K. Ganiyev, M.M. Karimov, K.A. Tashev. Axborot xavfsizligi. -Т.: «Fan va texnologiya», 2017
Katz, J., & Lindell, Y. (2020). Introduction to Modern Cryptography. Chapman and Hall/CRC.
Stallings, W. (2017). Cryptography and Network Security: Principles and Practice . Pearson.
- Downloads
- Published
- 2025-04-29
- Section
- Articles