Public key cryptography or asymmetric cryptography is an encryption technique that used two pairs of keys that are named as a public key and a private key.
In public key cryptography (PKC), the public key is used to encrypt the message and it can only decrypt by the private key.
Public key cryptography (PKC) is more robust and can not be breakthrough by any third party security breach attempts.
PKC enables the confidentiality, data integrity, authentication and non-repudiation for secure communication.
As public key cryptography works on the basis of two key pairs which are named as the public key and private key. These key pairs are formed in such a way that the private key can never be obtained from the public key.
Now, the public key is known to everyone, so the sender can encrypt the message by using the receiver’s public key.
But the private key is only known to the receiver who can use it to decrypt the message of the sender. This means the third parties can never obtain the original message even after they got the encrypted message of the sender because they do not have any access to the private key.
RSA (Rivest-Shamir-Adleman) is the most commonly used algorithm for generating key pairs in public key cryptography.
Generally, RSA mathematically generates two key pairs where one is the private key which is kept secret by the owner and another one is the public key which can be shared to anyone.
What is Bitcoin? All you need to know about Bitcoin
What is Cryptocurrency Mining? Is Bitcoin Mining Profitable?
]]>Cryptography is the art of secret writing by encrypting sensitive information using codes and algorithms.
The main goal of cryptography is to make sensitive data not readable by third parties. Only the sender and receiver can read or understand that data.
In cryptography, crypt means “hidden” and graphy stands for “writing” which shows the cryptography meaning as hidden writing.
In symmetric key cryptography, There is only one secret key is used for encryption and decryption of the message.
By using this secret key the algorithms convert the original message into the fixed length of bits known as a block cipher.
The same secret key which is used by the sender to encrypt the message is transferred to the receiver through a secure channel, then after receiving the secret key successfully, the receiver can decrypt the message by using this secret key.
It gives rise to the key distribution problem due to sender has to send the secret key to the receiver through the secure channel.
In Asymmetric key cryptography, there are two different keys used for encryption and decryption of the message.
These two different keys are named as the public key and the private key. Here the public key is known to everyone but the private key is only owned by the receiver.
The public key is used to encrypt the message by the sender and the private key is used to decrypt the message which is only owned by the receiver. So no other person can decrypt that message, not even the sender.
This type of cryptography is widely used in the cryptocurrency world and even bitcoin concept has used this type of cryptography technique.
It is used in the transmission of email files, social media communication, in the remote server connections and the “https” protocol used it to secure information on web communication.
Hashing is the one-way encryption where no secret key is used as no need for decryption.
Usually, hashing used the hash function which changed the original message into a random unreadable text string of fixed length known as a hash.
This text string of fixed length can be used to check the validity of the message that it was tampered or not by eves.
There is no way to obtain the original message from the hash string.
This technique is used in the blockchain technology as it helps to check the validity of the whole blockchain which can be verified just by comparing the single hash to the peers on the network and no need to verify the whole data of blockchain.
Modern cryptography is implemented by using the four primary cryptographic functions:
The Receiver can confirm the validity of the message that it was created by the original sender and not tampered with.
It is like a sender sends a message by encrypting it with his private key and the receiver can confirm that message by decrypting the message with the sender’s public key.
Example- The SSL certificate (‘https’) of the web server validates the proof of the connection of the user to the right server.
Third parties are not able to access or understand the original information or data due to the strong encryption of cryptography.
Your information or data is secured even after it leaked to the other people.
It must be ensured that data is not tampered or altered by eves during transmission or storage.
Cryptography Hashing technique is used for the data integrity check where the hash is used to ensure safe storage or transmission.
The owner or sender of information has no way to deny the ownership of that information.
The sender can never be denied that the message or data not created by him.
Like, someone promised to pay later for a product and will deny in the future that he/she didn’t promise anything. In this situation, if cryptography is used then he/she could never be denied his promise as the transaction was signed by him cryptographically.
What is Bitcoin? All you need to know about Bitcoin
What is Cryptocurrency Mining? Is Bitcoin Mining Profitable?
]]>