0% found this document useful (0 votes)
52 views

Modul Asymmetric Encryption

1. The document discusses asymmetric encryption, including an introduction to OpenSSL which is a software library that secures communications over networks. 2. It explains how to generate an OpenSSL RSA key pair consisting of a private key and public key, and how to encrypt data using the public key and decrypt it using the private key. 3. The document also lists some common ciphers, cryptographic hash functions, and public-key cryptography algorithms supported by OpenSSL such as AES, MD5, RSA, and Diffie-Hellman key exchange.

Uploaded by

Anggri Yulio
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views

Modul Asymmetric Encryption

1. The document discusses asymmetric encryption, including an introduction to OpenSSL which is a software library that secures communications over networks. 2. It explains how to generate an OpenSSL RSA key pair consisting of a private key and public key, and how to encrypt data using the public key and decrypt it using the private key. 3. The document also lists some common ciphers, cryptographic hash functions, and public-key cryptography algorithms supported by OpenSSL such as AES, MD5, RSA, and Diffie-Hellman key exchange.

Uploaded by

Anggri Yulio
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Modul Asymmetric Encryption

Present Share

3
File Edit View Insert Format Slide Arrange Tools Add-ons Help Last edit was on 1 April

2
Background Layout Theme Transition

1
8 7 6 5 4 3 2 1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
1

Asymmetric Encryption
@anggriyulio

1
2
2
What did you learn in this lesson
1. Asymmetric Encryption Concept
3
2. An Introduction to OpenSSL
3. How to Generate OpenSSL RSA Key Pair (Private Key & Public
Key)
4. How to Encrypt data using Public Key
5. How to Decrypt data using Private Key
6. The real scenarios of symmetric encryption?
4
5

Asymmetric Encryption
1. Asymmetric Encryption Concept
6
7

4
8

@anggriyulio
2. An Introduction to
OpenSSL OpenSSL is a software library for
applications that secure
communications over computer
9

networks against eavesdropping


or need to identify the party at
the other end.
10

5
11

Ciphers

AES, Blowfish, Camellia,


Chacha20, Poly1305 …...

Cryptographic hash functions

MD5, MD4, MD2, SHA-1, SHA-2,


12

SHA-3 …...
OpenSSL supports a number of
different cryptographic algorithms: Public-key cryptography

RSA, DSA, Diffie–Hellman key


exchange, Elliptic curve …...
13

6
14

RSA is one of the first


public-key cryptosystems and is
widely used for secure data
(Ron Rivest, Adi Shamir dan
transmission.
Leonard Adleman)

Click to add speaker notes

You might also like