How does public-key cryptography work?
The two keys used in public-key cryptography are related by a mathematical function
These functions are "easy" to perform but "hard" to reverse
Commonly used functioons include:
Factoring
Discrete logarithm
Elliptic-curve descrete logarithm
Public-key cryptography is secure as long as these problems remain "hard"
Quantum computing threatens this
Last updated