Encryption
-
Asymmetric-Key (Public-Key Encryption)
-
Article
- How Stuff Works - Tech - Computer - Computer Security - Authentication - How Encryption Works
- http://computer.howstuffworks.com/encryption4.htm
- "The browser then uses the public key to encrypt a randomly selected symmetric key. Public-key encryption takes a lot of computing, so most systems use a combination of public-key and symmetric key encryption. When two computers initiate a secure session, one computer creates a symmetric key and sends it to the other computer using public-key encryption. The two computers can then communicate using symmetric-key encryption. Once the session is finished, each computer discards the symmetric key used for that session. Any additional sessions require that a new symmetric key be created, and the process is repeated."
- https://keybase.io/verify
-
Others
openssl ecparam -list_curves
openssl ecparam -cut ec_key.pem -name sec-... -genkey