Asymmetric Cryptography ๐๐
Overview ๐
Asymmetric cryptography, also known as public key cryptography, involves using a pair of keys for encryption and decryption. Unlike symmetric encryption, where the same key is used for both operations, asymmetric cryptography employs different keys.
Key Concepts ๐๏ธ
Key Pairs:
Private Key: Kept secret and used for decryption.
Public Key: Shared openly and used for encryption.
Generation: Each party generates a private key and derives a corresponding public key.
Encryption and Decryption:
Encryption: Suzanne uses Darryl's public key to encrypt a message.
Decryption: Darryl uses his private key to decrypt the message.
Reverse Operation: Darryl uses Suzanne's public key to encrypt his reply, and Suzanne uses her private key to decrypt it.
Public Key Signatures:
Digital Signature: Suzanne signs her message with her private key.
Verification: Darryl uses Suzanne's public key to verify the message's authenticity and integrity.
Tamper Detection: Any modification to the message will cause the signature validation to fail.
Functions of Asymmetric Cryptography ๐ก๏ธ
Confidentiality:
Achieved through encryption, ensuring that the message remains private and secure from unauthorized parties.
Authenticity:
Verified by digital signatures, confirming that the message was not altered and came from the claimed sender.
Non-Repudiation:
Ensures that the sender cannot deny the origin of the message, providing proof of the message's authenticity.
Summary ๐
Asymmetric Cryptography: Uses a pair of keys (public and private) for encryption and decryption.
Public Key Signatures: Enable verification of the senderโs identity and message integrity.
Key Benefits: Provides confidentiality, authenticity, and non-repudiation in communications.
๐๐๐ก๏ธ
Last updated