Asymmetric Encryption
In the 1970s, asymmetric encryption was devised to address some of the weaknesses of symmetric encryption that we discussed in the previous section.
The first step in asymmetric encryption is to generate two different keys that look totally different but are algorithmically related. One of them is chosen as the private key, Kpr, and the other one is chosen as the public key, Kpu. Mathematically, we can represent this as follows:
EKpr(P) = C
Here, P is the plain text and C is the cipher text.
We can decrypt it as follows:
DKpu(C) = P
Public keys are supposed to be freely distributed and private keys are kept secret by the owner of the key pair.
The fundamental principle is that if you encrypt with one of the keys, the ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access