paint-brush
Glossary of Security Terms: Public-key Cryptographyby@mozilla
126 reads

Glossary of Security Terms: Public-key Cryptography

by Mozilla ContributorsSeptember 8th, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Public-key cryptography is a cryptographic system in which keys come in pairs. The transformation performed by one of the keys can only be undone with the other. This gives public-key encryption systems an advantage over symmetric encryption systems in that the encryption key can be made public. They are typically much slower than symmetric algorithms, so they do not scale well for long messages. The only used cryptosystems are RSA (for both signing and encryption), DSA (for signing) and Diffie-Hellman.

Company Mentioned

Mention Thumbnail
featured image - Glossary of Security Terms: Public-key Cryptography
Mozilla Contributors HackerNoon profile picture

Public-key cryptography — or asymmetric cryptography — is a cryptographic system in which keys come in pairs. The transformation performed by one of the keys can only be undone with the other key. One key (the private key) is kept secret while the other is made public.

When used for digital signatures, the private key is used to sign and the public key to verify. This means that anyone can verify a signature, but only the owner of the corresponding private key could have generated it.

When used for encryption, the public key is used to encrypt and the private key is used to decrypt. This gives public-key encryption systems an advantage over symmetric encryption systems in that the encryption key can be made public. Anyone could encrypt a message to the owner of the private key, but only the owner of the private key could decrypt it. However, they are typically much slower than symmetric algorithms and
the size of message they can encrypt is proportional to the size of the key, so they do not scale well for long messages.

As a result, it's common for an encryption system to use a symmetric
algorithm to encrypt the message, then a public-key system to encrypt the symmetric key. This arrangement can confer the benefits of both systems.

Commonly used public-key cryptosystems are RSA (for both signing and
encryption), DSA (for signing) and Diffie-Hellman (for key agreement).

 View Previous Terms: