What is a public key cryptography?

Public key cryptography is a widely accepted cryptographic system used to encrypt data. Unlike symmetrical cryptography, which uses a single key, this type of system is considered asymmetrical because it relies on a few keys. Public Key cryptography was originally introduced in the 1970s of cryptographic Whitfield Diffie and Martin Hellman. Such cryptographic systems are often referred to as Diffie-Hellman encryption as a way to pay tribute to inventors.

As mentioned, Public Key cryptography uses two keys: one public and one private. Both keys play a role in encryption of the data protection message it contains and decrypt the message to read it. In this system, the public key can be shared and distributed freely. However, the private key is kept secret and only anyone who owns the key should be accessible. To provide additional security layers, a private key is protected by an encrypted access phrase, which is essentially a stronger version of theesl inYet -created key owner.

both the public and private key is related to the mathematical aspect. Despite this relationship, it is mathematically impossible for the private key to derive from the public key. This is because it serves two very clear purposes. The public key is designed to encrypt the initial message while the purpose of the private key is to decipher them. Each public key encrypted can only be displayed after decryption with the corresponding private key.

As an example of a public key cryptography is examined by communication between John and Jane. John generates a few keys and sends a public key to Jane, which uses the key to encrypt the message so that only John can read it. When receiving a message from Jane, John uses his secret key to decrypting and reading. Because John has created a key pair, the owner is the owner of the key, and therefore the only person who is able to decrypt and read the message.

Everyone,Those who want to use public key cryptography can easily do it by e -mail. For example, if John wants to maintain communication between him and Jane private, he could simply attach the public key he needs to encrypt the message. Because the key can be shared with anyone, it is not sent by e -mail a security risk. One of the common examples of applications that use this system is the popular encryption software known as quite good privacy® (PGP®).

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?