When planning a public key infrastructure, the question arises as to which cryptographic algorithms it should use.
The main principles are explained below.
Continue reading „Grundlagen: Schlüsselalgorithmen, Signaturalgorithmen und Signaturhashalgorithmen“