Statements (48)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:XMPP_Extension_Protocol
|
gptkbp:based_on |
gptkb:Diffie-Hellman_key_exchange
mathematical problems in number theory |
gptkbp:consists_of |
key generation
decryption process encryption process |
https://www.w3.org/2000/01/rdf-schema#label |
El Gamal encryption
|
gptkbp:invention |
gptkb:Taher_Elgamal
|
gptkbp:is_compatible_with |
gptkb:Mathematician
|
gptkbp:is_considered |
a foundational algorithm in cryptography
a secure encryption method |
gptkbp:is_described_as |
cryptography textbooks
|
gptkbp:is_evaluated_by |
performance metrics
cryptanalysis studies |
gptkbp:is_explored_in |
gptkb:academic_research
|
gptkbp:is_implemented_in |
cryptographic libraries
SSL/ TLS protocols PGP (Pretty Good Privacy) |
gptkbp:is_often_used_in |
real-time applications
|
gptkbp:is_part_of |
encryption standards
cryptographic protocols cryptographic research secure software development practices secure communication frameworks |
gptkbp:is_related_to |
gptkb:XMPP_Extension_Protocol
|
gptkbp:is_used_for |
secure data transmission
|
gptkbp:is_used_in |
gptkb:software_framework
data integrity verification digital currencies secure cloud storage secure messaging applications secure voting systems secure email services secure file storage |
gptkbp:is_vulnerable_to |
chosen ciphertext attacks
|
gptkbp:key |
2048 bits
|
gptkbp:provides |
semantic security
|
gptkbp:requires |
gptkb:building
|
gptkbp:speed |
RSA encryption for encryption and decryption
RSA encryption for key generation |
gptkbp:suitable_for |
large data sets
low-latency applications stream encryption |
gptkbp:used_in |
digital signatures
|
gptkbp:uses |
asymmetric key pairs
|
gptkbp:bfsParent |
gptkb:Gnu_PG_1.4.65
gptkb:Taher_Elgamal |
gptkbp:bfsLayer |
4
|