Search IconIcon to open search

Public-key Cryptography

Last updated Apr 7, 2022 Edit Source

Asymmetric cryptography involves a pair of keys, one for encrypting (public) another for decrypting (private). One is private ($K^-$), the other is public ($K^+$). The key property is that one key cannot be obtained from the other in reasonable computation time

Common forms of Asymmetric Cryptography are RSA and ECC

# Two use cases

  1. Sender encrypts with public key
    • Only private key can decrypt it
    • Used for confidentiality
  2. Owner encrypts with private key
    • Anyone can decrypt as public key is public
    • Used for authentication/proof of ownership

Can theoretically encrypt using private key but anyone with public key can decrypt!