Introduction to Asymmetric Cryptography – Part 2/2

The idea of the Asymmetric Cryptography is completely different than the Symmetric Cryptography, but slightly identical. They are identical in the term of exchanging data (hidden messages). However, they different in the way the key is exchanged. The Asymmetric Algorithm or the (Public-key) is a Cryptography technique that allows many parties to send a message, but only one who has the access to these messages.

The principle of the Asymmetric Cryptography is to have two different keys. The first key is to encrypt, which is publicly defined usually. While, the second key is to decrypt, which kept private. For example, think of the mailbox principle, where everyone can drop a letter (encrypt the message via the public key); while only the mailman has the key to open the box (private key). Note: We can have multiple public key, but only one private key to achieve more security on this technique. See the figure below for more details:

screen-shot-2017-02-21-at-4-46-51-pm

This figure above shows the following:

  • The users deposit (encrypts) a message with their public-key (Kpub).
  • Only the Mailman has the private-key (Kpr) to retrieve (decrypt) the message.

Remember: Encryption is done via the public-key; while Decryption via the private-key.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s