: Based on the difficulty of factoring large prime numbers. Diffie-Hellman : Used primarily for secure key exchange.
: Implementation is fraught with side-channel attacks; use vetted libraries instead. Applied Cryptography: Protocols, Algorithms, an...
: Preventing a party from denying they sent a message. Technical Overview : Based on the difficulty of factoring large prime numbers
Common examples include MD5 and SHA-1 (though many from the original book are now considered cryptographically broken). Key Takeaways for Developers Applied Cryptography: Protocols, Algorithms, an...