logo

ASYMMETRIC CRYPTOGRAPHY

Authors
  • Usmonov Faxriddin Sharofiddin o‘g‘li

    Author
  • Usmonov Fazliddin Sharofiddin o‘g‘li

    Author
Keywords:
Asymmetric cryptography, plaintext, cipher text, public key, private key, encryption, decryption
Abstract

This article provides information on the concept of asymmetric cryptography, its principles of operation and basic algorithms. Asymmetric cryptography is based on the use of two keys – public and private keys-to encrypt and decrypt data. The main advantages of this method are a high level of security, the ability to solve and confirm the problem of key sharing. The article also provides a brief overview of the asymmetric algorithm of the RSA. Asymmetric cryptography is widely used in areas such as internet security, electronic signatures and cryptocurrencies.

References

S.K.Ganiev, A.A.Ganiev, Z.T.Xudoyqulov. Kiberxavfsizlik asoslari: O‘quv qo‘llanma. - Т.: «Aloqachi», 2020

S.K. Ganiyev, M.M. Karimov, K.A. Tashev. Axborot xavfsizligi. -Т.: «Fan va texnologiya», 2017

Katz, J., & Lindell, Y. (2020). Introduction to Modern Cryptography. Chapman and Hall/CRC.

Stallings, W. (2017). Cryptography and Network Security: Principles and Practice . Pearson.

Cover Image
Downloads
Published
2025-04-29
Section
Articles