Hacker News new | past | comments | ask | show | jobs | submit login

This is the description of public key cryptography, or as you referred to it, asymmetric cryptography. It is a different technique and solves a different problem from the other metaphor above by asmithmd1, which is for Diffie-Hellman(-Merkle) key exchange.



Oh. Thank you. I suppose I'll go re-read the other post and learn something.

Is the term 'asymmetric key encryption' meaningful, or did I just make that up?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: