Cryptography- Part 2
Asymmetric Cryptography / Public Key Cryptography
In this method, two keys are used:
- Private Key: This key is only known by the owner itself.
- Public key: This key is issued by using Public Key Infrastructure (PKI) where a trusted Certification Authority (CA) certifies the ownership of key pairs.
Only the private key can decrypt the message; thus, an attacker possessing only the public key can’t decrypt the message. A secure message guarantees the confidentiality of the message.
Everyone knows public key while one key is kept secret and is used to encrypt the data by the sender. Each sender uses its secret key (known as a private key) for encrypting its data before sending.
The receiver uses the respective public key of the sender to decrypt the data.
When two parties want to exchange an encrypted message by using asymmetric key cryptography, they follow these steps:
- The sender encrypts the plaintext message with the intended recipient’s public key.
- This produces a ciphertext message that can then be transmitted to the intended recipient.
- The recipient then decrypts the message with his private key, known only to him.