First page Back Continue Last page Overview Graphics
Asymmetric Key Cryptography
Aka Public key cryptography
A pair of related keys are used:
- Public and Private keys
- Private key can’t be calculated from Public key
Data encrypted with one can only be decrypted with the other
Usually, a user publishes his public key widely
- Others use it to encrypt data intended for the user
- User decrypts using the private key (known only to him)
Examples: RSA