Expand description
Asymmetric algorithms
Asymmetric algorithms (also known as public-key algorithms) use pairs of keys: public key, which can be known by others, and private key, which is known only to the owner. The most common usages include encryption and digital signing.
Modules§
- agreement
- Functionality related to secret agreement and key derivation.
- builder
- Type-safe asymmetric key generation.
- ecc
- Elliptic curve cryptography (ECC) primitives.
- signature
- Digital signature facilities.
Structs§
- Asymmetric
Algorithm - Asymmetric algorithm provider.
- Asymmetric
Key - Asymmetric key handle.
- Dh
- Marker type representing the DH (Diffie-Hellman) algorithm.
- Dsa
- Marker type representing the DSA (Digital Signature Algorithm).
- Ecdh
- Marker type representing the ECDH (Elliptic Curve Diffie-Hellman) algorithm.
- Ecdsa
- Marker type representing the ECDSA (Elliptic Curve Digital Signature Algorithm).
- Oaep
Padding - OAEP (Optimal Asymmetric Encryption Padding) data.
- Private
- Marker type used to denote private key parts.
- Public
- Marker type used to denote public key parts.
- Rsa
- Marker type representing the RSA (Rivest-Shamir-Adleman) algorithm.
Enums§
- Asymmetric
Algorithm Id - Asymmetric algorithm identifiers.
- DsaPrivate
Blob - Raw private DSA key data blob.
- DsaPublic
Blob - Raw public DSA key data blob.
- Encryption
Padding - Supported encryption padding schemes.