tutorial, asymmetric-encryption, opps,

Opps - asymmetric-encryption

Upendra Upendra Follow Jan 23, 2025 · 3 mins read
Opps - asymmetric-encryption
Share this

Asymmetric Key Encryption

Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys - one public key and one private key - to encrypt and decrypt a message and protect it from unauthorized access or use.

A public key is a cryptographic key that can be used by any person to encrypt a message so that it can only be decrypted by the intended recipient with their private key. A private key - also known as a secret key - is shared only with key’s initiator.1

Asymmetric cryptography typically gets used when increased security is the priority over speed and when identity verification is required, as the latter is not something symmetric cryptography supports. Some of the most common use cases for asymmetric cryptography include:2

  • Digital signatures: Confirming identity for someone to sign a document;
  • Blockchain: Confirming identity to authorize transactions for cryptocurrency;
  • Public key infrastructure (PKI): Governing encryption keys through the issuance and management of digital certificates.

How Does Asymmetric Cryptography Work?

Sensitive messages move through a process of encryption and decryption with public and private keys.

An algorithm starts the process. A mathematical function generates a key pair. Each key is different, but they are related to one another mathematically.

Imagine that someone wants to send an encrypted message to another person. The process looks like this:

  • Registration: The user and the sender have connected with an official entity that generated both public and private keys;
  • Lookup: The sender scours a public-key directory for the recipient’s public key information;
  • Encrypt: The sender creates a message, encrypts it with the recipient’s public key, and sends it;
  • Decode: The recipient uses the private key to unscramble the message;
  • Reply: If the recipient wants to respond, the process moves in reverse.

What are the benefits and disadvantages of asymmetric cryptography?

The benefits of asymmetric cryptography include:

  • The key distribution problem is eliminated because there’s no need for exchanging keys;
  • Security is increased since the private keys don’t ever have to be transmitted or revealed to anyone;
  • The use of digital signatures is enabled so that a recipient can verify that a message comes from a particular sender;
  • It allows for nonrepudiation so the sender can’t deny sending a message.

Disadvantages of asymmetric cryptography include:

  • It’s a slow process compared to symmetric cryptography. Therefore, it’s not appropriate for decrypting bulk messages;
  • If an individual loses his private key, he can’t decrypt the messages he receives;
  • Because public keys aren’t authenticated, no one can ensure a public key belongs to the person specified. Consequently, users must verify that their public keys belong to them;
  • If a malicious actor identifies a person’s private key, the attacker can read that individual’s messages.

Links

asymmetric cryptography (public key cryptography)

Asymmetric Encryption: Definition, Architecture, Usage

When to Use Symmetric Encryption vs. Asymmetric Encryption

Further reading

All You Need to Know About Asymmetric Encryption

Asymmetric Key Ciphers

credit goes to @swayangjit
Join Newsletter
Get the latest news right in your inbox. We never spam!
Upendra
Written by Upendra Follow
Hi, I am Upendra, the author in Human and machine languages,I don't know to how 3 liner bio works so just Connect with me on social sites you will get to know me better.