An asymmetric algorithm makes use of different keys for encryption and decryption. Of the two keys, one is to be kept secret (private key) and the other may be published for all to see (public key). The derivation of the private key from the public key should be computationally infeasible. Some example uses of asymmetric algorithms are to be found in the areas of public key encryption and digital signing.
L. R. Knudsen, M. J. B. Robshaw, The Block Cipher Companion. Springer, 2011.
Copyright © 2014 Barry Watson. All rights reserved.