© Stephen Haunts 2019
Stephen HauntsApplied Cryptography in .NET and Azure Key Vaulthttps://doi.org/10.1007/978-1-4842-4375-6_7

7. Asymmetric Encryption

Stephen Haunts1 
(1)
Belper, Derbyshire, UK
 
In Chapter 6, we looked at symmetric encryption, which is a two-way encryption process that uses the same key for both encryption and decryption of your message, as shown in Figure 7-1. In the diagram, we have plaintext, or our original data, represented on the left, which is then encrypted with a key to produce our encrypted data, or ciphertext. That data is decrypted using the same key to uncover the original data, or plaintext. This process is referred to as symmetric encryption because we use the same key for both encryption and decryption.
Figure 7-1 ...

Get Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.