<aside>
<img src="/icons/package_gray.svg" alt="/icons/package_gray.svg" width="40px" /> Public Key Cryptography does not require a shared secret key
</aside>
Uses a key pair
- Public key for encryption
- Private key for decryption
Confidentiality with Public Key
- Encrypt data using the receiver’s public key
- Only the recipient with the corresponding private key can decrypt it
Non-Repudiation with Private Key
- Encrypt data using the sender’s private key
- Anyone with access to the sender’s public key can verify the sender’s identity
Integrity and Authentication with Digital Signatures
- Create a hash digest of the message
- Encrypt the hash digest with the sender’s private key
- Encrypt the message with the receiver’s public key
- Ensures message integrity, non-repudiation, and confidentiality
Common Asymmetric Algorithms
- Diffie-Hellman
- RSA (Ron Rivest, Adi Shamir, Leonard Adleman)
- Elliptic Curve Cryptography