• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » What is Asymmetric Cryptography?

By Abhishek Ghosh August 23, 2019 4:32 pm Updated on August 23, 2019

What is Asymmetric Cryptography?

Advertisement

Asymmetric cryptography or two-key cryptography is the cryptographic method that a pair uses of keys for sending messages. The two keys belong to the same person who will receive the message. One key is public and can be delivered to anyone, the other key is private and the owner must keep it so that no one has access to it. In addition, cryptographic methods guarantee that this key pair can only be generated once, so it can be assumed that it is not possible for two people to casually obtain the same key pair.

If a person sending a message to a recipient, then will use the later’s public key to encrypt it. Once encrypted, only the recipient’s private key can decrypt the message, since it is the only one that should know it. Therefore the confidentiality of sending the message is achieved, no one but the recipient can decipher it. Anyone, using the recipient’s public key, can encrypt messages; Those that will only be decrypted by the recipient using their private key.

If the owner of the key pair uses his private key to encrypt a message, anyone can decrypt it using the public key of the first. In this case the identification and authentication of the sender is achieved, since it is known that it could only have been he who used his private key (unless a third party has obtained it). This idea is the foundation of the electronic signature, where legally there is a presumption that the signer is effectively the owner of the private key.

Advertisement

---

The public key encryption systems or asymmetric encryption systems were invented in order to completely avoid the problem of key exchange of symmetric encryption systems. With the public keys it is not necessary for the sender and the recipient to agree on the key to be used. All that is required is that, before initiating the secret communication, each one must obtain the public key of the other and each take care of his private key. Moreover, those same public keys can be used by anyone who wishes to communicate with any of them provided that each public key is used correctly.

Asymmetric Cryptography

 

  1. Ana writes a message.
  2. Ana encrypts the message with David’s public key .
  3. Ana sends the encrypted message to David through the internet, either by email, instant messaging or any other means.
  4. David receives the encrypted message and decrypts it with his private key .
  5. David can now read the original message Ana sent him.

The two main branches of public key cryptography are:

  1. Public key encryption: a message encrypted with a recipient’s public key cannot be decrypted by anyone (including the one who encrypted it), except a holder of the corresponding private key, presumably its owner and the person associated with the public key used . Its function is to guarantee the confidentiality of the message.
  2. Digital signatures: A message signed with the sender’s private key can be verified by anyone who has access to the sender’s public key, which shows that this sender had access to the private key (and therefore, it is likely that be the person associated with the public key used). This ensures that the message has not been altered, since any manipulation of the message would affect a different result of the message digest algorithm (encoded message digest). It is used to guarantee the authenticity of the message.

An analogy with public key encryption is that of a mailbox with a mail slot. The mail slot is exposed and accessible to the public; its location (the street address) is, in essence, the public key. Someone who knows the street address can go to the door and place a written message through the slot; however, only the person who owns the key (private key) can open the mailbox and read the message. An analogy for digital signatures is the sealing of an envelope with a personal seal. The message can be opened by anyone, but the presence of the seal authenticates the sender.

Tagged With what is asymmetric ciphers , What is asymmetric crypto system
Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to What is Asymmetric Cryptography?

  • Nginx WordPress Installation Guide (All Steps)

    This is a Full Nginx WordPress Installation Guide With All the Steps, Including Some Optimization and Setup Which is Compatible With WordPress DOT ORG Example Settings For Nginx.

  • How Email Encryption Works

    Email encryption is used to send sensitive information by email from sender to recipient. Encryption between the end devices of sender and recipient is possible as end-to-end encryption. Email encryption often goes hand in hand with the digital signature and is actually combined with it in many standards such as X.509 or PGP. The goal […]

  • WordPress & PHP : Different AdSense Units on Mobile Devices

    Here is How To Serve Different AdSense Units on Mobile Devices on WordPress With PHP. WordPress Has Function Which Can Be Used In Free Way.

  • Use of Bitcoins in Online Trading : Part III

    This is the third and final part of the series Bitcoins in Online Trading. The second part of the article can be read here. Through the Internet and its commercial use, the demands on cryptography have increased. Due to these requirements, a separate area has developed whose main task is new information systems that protect […]

performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Hybrid Multi-Cloud Environments Are Becoming UbiquitousJuly 12, 2023
  • Data Protection on the InternetJuly 12, 2023
  • Basics of BJT TransistorJuly 11, 2023
  • What is Confidential Computing?July 11, 2023
  • How a MOSFET WorksJuly 10, 2023
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy