TrustPort Basic, free, for all customers
- Updates via the internet
- E-mail hot-line, Mon-Fri 8.00-16.00 CET
- Helpdesk system
TrustPort VIP, prepaid, for business customers
- Basic support included
- Optional additional services
Before you decide to contact support, we recommend that you try to find the information needed in the Technical FAQ and Sales FAQ.
Sales support: email@example.com
Technical support: firstname.lastname@example.org
Tel.: +420 541 244 471
Fax: +420 541 235 038
TrustPort a. s.
612 00 Brno, Czech Republic
Asymmetric cryptography is used to encrypt data and also to create electronic signatures. During the coding process, different parts of the encryption key are used for the encryption of data, whilst other parts are used for decryption. Together, the two keys are referred to as a key pair. Encryption occurs with the help of the public key, and decryption occurs with the help of the private key.
Representatives of these algorithms are RSA, Diffie Hellman, and Algorithm of elliptical curves. The public part of the signed key is referred to as certification authority certificate. The advantage of these algorithms is the fact that the private part of the key does not need to be delivered to the communication counterpart, and therefore its disclosure is not a threat. The disadvantage is the speed of data processing, which is quite slower than that of the symmetric algorithms.