Public Key Infrastructure (PKI)
Learn how PKI enables you to unlock secure digital transformation.

What encryption algorithms are supported by eMudhra PKI?
eMudhra PKI supports an array of industry-standard encryption algorithms to provide robust security and maintain data integrity. The primary algorithms include RSA (Rivest–Shamir–Adleman), which is renowned for its application in secure data transmission and digital signatures. RSA's strength lies in its widespread use and the mathematical complexity of factoring large numbers, making it a preferred choice for many security protocols.
Another supported algorithm is ECC (Elliptic Curve Cryptography), which offers similar security levels to RSA but with much smaller key sizes. This efficiency makes ECC particularly advantageous in scenarios where computational resources are limited or when dealing with mobile devices or IoT (Internet of Things) devices where battery life and processing power are constraints.
Additionally, eMudhra utilizes SHA (Secure Hash Algorithm) for hashing purposes. SHA algorithms are crucial for verifying data integrity by generating unique digital fingerprints or hash values for documents or messages, ensuring that any alteration to the data can be detected.
Looking forward, eMudhra is also preparing for the quantum computing era by exploring post-quantum cryptography. This proactive approach involves developing encryption techniques that are resistant to attacks by quantum computers, which could potentially decrypt traditional algorithms. By integrating these advanced security measures, eMudhra aims to keep its PKI solutions secure against both current and future cryptographic threats.