Skip to Content
Solidity Programming Essentials
book

Solidity Programming Essentials

by Ritesh Modi
April 2018
Intermediate to advanced
222 pages
5h 28m
English
Packt Publishing
Content preview from Solidity Programming Essentials

Asymmetric encryption and decryption

Asymmetric cryptography refers to the process of using two keys for encryption and decryption. Any key can be used for encryption and decryption. Message encryption with a public key can be decrypted using a private key and messages encrypted by a private key can be decrypted using a public key. Let's understand this with the help of an example. Tom uses Alice's public key to encrypt messages and sends it to Alice. Alice can use her private key to decrypt the message and extract contents out of it. Messages encrypted with Alice's public key can only be decrypted by Alice as only she holds her private key and no one else. This is the general use case of asymmetric keys. There is another use which we will ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Solidity Programming Essentials - Second Edition

Solidity Programming Essentials - Second Edition

Ritesh Modi
The Go Programming Language

The Go Programming Language

Alan A. A. Donovan, Brian W. Kernighan
Linux Kernel Programming

Linux Kernel Programming

Kaiwan N. Billimoria
Programming Rust, 2nd Edition

Programming Rust, 2nd Edition

Jim Blandy, Jason Orendorff, Leonora F. S. Tindall

Publisher Resources

ISBN: 9781788831383Supplemental Content