ACIL FM
Dark
Refresh
Current DIR:
/usr/share/doc/python3-cryptography/docs/hazmat/primitives/asymmetric
/
usr
share
doc
python3-cryptography
docs
hazmat
primitives
asymmetric
Upload
Zip Selected
Delete Selected
Pilih semua
Nama
Ukuran
Permission
Aksi
dh.rst
11.93 MB
chmod
View
DL
Edit
Rename
Delete
dsa.rst
12.44 MB
chmod
View
DL
Edit
Rename
Delete
ec.rst
28.82 MB
chmod
View
DL
Edit
Rename
Delete
ed448.rst
4.31 MB
chmod
View
DL
Edit
Rename
Delete
ed25519.rst
6.73 MB
chmod
View
DL
Edit
Rename
Delete
index.rst
1.25 MB
chmod
View
DL
Edit
Rename
Delete
rsa.rst
24.85 MB
chmod
View
DL
Edit
Rename
Delete
serialization.rst
36.08 MB
chmod
View
DL
Edit
Rename
Delete
utils.rst
2.79 MB
chmod
View
DL
Edit
Rename
Delete
x448.rst
6.61 MB
chmod
View
DL
Edit
Rename
Delete
x25519.rst
6.76 MB
chmod
View
DL
Edit
Rename
Delete
Edit file: /usr/share/doc/python3-cryptography/docs/hazmat/primitives/asymmetric/index.rst
.. hazmat:: Asymmetric algorithms ===================== Asymmetric cryptography is a branch of cryptography where a secret key can be divided into two parts, a :term:`public key` and a :term:`private key`. The public key can be given to anyone, trusted or not, while the private key must be kept secret (just like the key in symmetric cryptography). Asymmetric cryptography has two primary use cases: authentication and confidentiality. Using asymmetric cryptography, messages can be signed with a private key, and then anyone with the public key is able to verify that the message was created by someone possessing the corresponding private key. This can be combined with a `proof of identity`_ system to know what entity (person or group) actually owns that private key, providing authentication. Encryption with asymmetric cryptography works in a slightly different way from symmetric encryption. Someone with the public key is able to encrypt a message, providing confidentiality, and then only the person in possession of the private key is able to decrypt it. .. toctree:: :maxdepth: 1 ed25519 x25519 ed448 x448 ec rsa dh dsa serialization utils .. _`proof of identity`: https://en.wikipedia.org/wiki/Public-key_infrastructure
Simpan
Batal
Isi Zip:
Unzip
Create
Buat Folder
Buat File
Terminal / Execute
Run
Chmod Bulk
All File
All Folder
All File dan Folder
Apply