## Public key[Home] This page outlines a wide range of methods used in encryption.
## Public-key encyption methods (RSA)The following are the tips related to encryption: **RSA**. Simple RSA Calculation. This is a simple tutorial for RSA key generation.**RSA**. RSA Encryption. This uses RSA key generation and encryption.**RSA (range of keys)**. RSA Encryption. This uses RSA key generation and encryption using a range of key sizes from 512-bits up to 16,384 bit.**RSA with Commutative Keys**. Comm. Commutative encryption allows Bob and Alice to encrypt in any order, and then they can decrypt in any order.**Commutative Keys (with SRA - Shamir, Rivest and Aldeman)**. Comm. Commutative encryption examples.**RSA Decrypt**. RSA. This outlines RSA decryption.**RSA -partially homomorphic cryptosystem**. RSA. This outlines RSA as a partially homomorphic cryptosystem.**Public Key (ASCII format)**. RSA Public Key. Often we have to convert the public key to an ASCII format.
## Public-key encyption methods (Others)The following are the tips related to encryption: **PGP Encryption**. PGP. This uses PGP encryption.**DSA**. DSA Encryption. This uses DSA key and fingerprint generation.**ElGamal**. ElGamal. ElGamal is a public key method which uses discrete logarithms.**Selecting G in ElGamal**. G in ElGamal. ElGamal is a public key method which uses discrete logarithms.**Elliptic Curve**. Elliptic Curve. Elliptic Curv is a public key method which can also be used to generate a shared key.**Elliptic Curve (Plot)**. Elliptic Curve (Plot). Elliptic Curv is a public key method which can also be used to generate a shared key. This page outlines a graphic of the curve.**Knapsack Encryption (Theory)**. Knapsack. This outlines Knapsack public encryption**Knapsack Encryption (Example)**. Knapsack. This outlines Knapsack public encryption**Paillier crypto system (JavaScript)**. Paillier. Outlines Paillier crypto system using JavaScript.**Identity Based Encryption (IBE)**. IBE. Outlines Identity Based Encryption.**Cramer-Shoup**. Cramer-Shoup. Outlines Cramer-Shoup public key encryption.
## PresentationThe following is an outline presentation on encryption: |