Abstract


  • Also known as Public key Cryptography or Public Private Key
  • Achieved with Public Key & Private Key which are mathematically related
  • What Public Key encrypts can only be decrypted by Private Key (used in Symmetric Key Exchange)
  • What Private Key encrypts can only be decrypted by Public Key (used in Digital Signature)

Convenient

Eliminate the need to exchange keys physically

Computationally Heavy

Compared to Symmetric Cryptography, so we usually use asymmetric cryptography to exchange the symmetric key and use symmetric cryptography for the rest of the secure communication

Public Key

  • Distributed to everyone & anyone

Private Key

  • Should be kept 100% secret to the owner

Common Asymmetric Cryptography Algo


RSA

ECDSA

EdDSA, ED25519