DOC HOME SITE MAP MAN PAGES GNU INFO SEARCH PRINT BOOK
 

(gcrypt.info.gz) Public Key cryptography (I)

Info Catalog (gcrypt.info.gz) Hashing (gcrypt.info.gz) Top (gcrypt.info.gz) Public Key cryptography (II)
 
 7 Public Key cryptography (I)
 *****************************
 
 Public key cryptography, also known as asymmetric cryptography, is an
 easy way for key management and to provide digital signatures.
 Libgcrypt provides two completely different interfaces to public key
 cryptography, this chapter explains the one based on S-expressions.
 

Menu

 
* Available algorithms        Algorithms supported by the library.
* Used S-expressions          Introduction into the used S-expression.
* Public key modules          How to work with public key modules.
* Cryptographic Functions     Functions for performing the cryptographic actions.
* General public-key related Functions  General functions, not implementing any cryptography.
 
Info Catalog (gcrypt.info.gz) Hashing (gcrypt.info.gz) Top (gcrypt.info.gz) Public Key cryptography (II)
automatically generated byinfo2html