DH (can only be used for key distribution, cannot encrypt or decrypt data)
Asymmetric encryption algorithm
Features:
Send Both the party and the receiver have a key pair (public key + private key), in which the public key is propagated and the private key is kept by itself and does not need to be propagated
The feature that the private key does not need to be propagated solves the problem of symmetric encryption algorithms Difficulty in key propagation (this difficulty can generally be solved through offline transmission)
Encryption is extremely secure and is only used on some e-commerce websites. The encryption and decryption speed is much lower than symmetric encryption
Generally, in order to solve the problem of low encryption and decryption speed of asymmetric encryption algorithms, asymmetric encryption (using public key + private key to encrypt and decrypt symmetric encryption keys) + symmetric encryption (encrypting and decrypting data) are used. way of combining.
Common algorithms:
DH (the cornerstone of asymmetric encryption)
RSA (the classic of asymmetric encryption, in addition to being used for asymmetric encryption, it can also be used for Digital signature, RSA--155 (512-bit key) has been cracked)
ElGamal