Expand description

Asymmetric algorithms

Asymmetric algorithms (also known as public-key algorithms) use pairs of keys: public key, which can be known by others, and private key, which is known only to the owner. The most common usages include encryption and digital signing.

Modules

  • Functionality related to secret agreement and key derivation.
  • Type-safe asymmetric key generation.
  • Elliptic curve cryptography (ECC) primitives.
  • Digital signature facilities.

Structs

  • Asymmetric algorithm provider.
  • Asymmetric key handle.
  • Marker type representing the DH (Diffie-Hellman) algorithm.
  • Marker type representing the DSA (Digital Signature Algorithm).
  • Marker type representing the ECDH (Elliptic Curve Diffie-Hellman) algorithm.
  • Marker type representing the ECDSA (Elliptic Curve Digital Signature Algorithm).
  • OAEP (Optimal Asymmetric Encryption Padding) data.
  • Marker type used to denote private key parts.
  • Marker type used to denote public key parts.
  • Marker type representing the RSA (Rivest-Shamir-Adleman) algorithm.

Enums

Traits

  • Marker trait for an asymmetric algorithm.
  • Export asymmetric key to the raw key data format.
  • Import asymmetric key using the raw key data format.
  • Marker trait used to denote whether a key holds public or private parts.