About this blog

Welcome guest,

Here is a Weblog which discuss all about Public key Cryptography(PKC). The content of this blog is updated from different sources like other similar blogs, books, and etc. So everything related to this PKC is found here.

And I hope this blog will be useful for students, lecturers and learners as everything related to PKC are explained here, in a simple and effective manner.

Thank you.

Friday, February 27, 2009

Key-based Algorithms

A key-based algorithm uses an encryption key to encrypt the message. This means that the encrypted message is generated using not only the message, but also using a 'key'.

Figure 1. Key-based encryption

The receiver can then use a decryption key to decrypt the message. Again, this means that the decryption algorithm doesn't rely only on the encrypted message. It also needs a 'key':

Figure 2. Key-based decryption

1 comment:

  1. Thanks for posting the meaning and usage of key based algorithms. I wanted to know which algorithm is used in the creation of digital signatures.
    digital signature software

    ReplyDelete