How Does Symmetric and Asymmetric Public Key Cryptography Work?

Written by Shiva | Published 2020/02/14
Tech Story Tags: blockchain | cryptography | public-key-cryptography | symmetric-cryptography | asymmetric-cryptography | crypto | digital-signatures | blockchain-technology

TLDR There are two types of Cryptography: Symmetric cryptography and Asymmetric Cryptography. Cryptography encodes the message in a way that no one can decrypt it except the receiver. This keeps the data safe from an eavesdropper, where they cannot read and understand the format. The Receiver uses the Receiver’s username to send the data to them and reads the data. This makes the system safe from eavesdroppers and more robust. Asymmetry Cryptography uses Key-pairs to decrypt the data and uses a single key to encrypt and decrypt.via the TL;DR App

no story

Written by Shiva | Blockchain Developer, Librocubicularist, Content writer.
Published by HackerNoon on 2020/02/14