Asymmetric Encryption – Simply explained

Encryption is the process of taking a message and stealing its contents just such Some people can look at your message. There are two types of encryption: symmetric and asymmetric. Let's first look at symmetric encryption to understand why the encryption was asymmetric Created. To do that, let me introduce you to Alice and Bob. Alice has a sensitive document that she wants to share with Bob.

She uses encryption software to protect her document with a password or passphrase Which password you choose (the password that Alice chooses) Then you send the encrypted document to Bob. However, Bob cannot open this message because he does not know which passphrase Alice is Used to encrypt the document. In other words, he does not have an open-lock key. Now comes a real problem: How does Alice securely share this passphrase with Bob? Sending it via email is risky because the passphrase may be found and used by others To decrypt any messages between Alice and Bob.

This is exactly the type of asymmetric problem the cipher intends to solve. It is comparable to a street mailbox. The mailbox is exposed to anyone who knows its location. We can say that the mailbox site in general. Anyone who knows the address can go to the mailbox and drop in a letter. However, only the owner of the mailbox has a key to open it and read the messages.

Let's go back to the technical details. When using asymmetric encryption, both Alice and Bob must generate a key on them Computers. A popular and safe way to do this is with the RSA algorithm. This algorithm will generate the audience and a mathematically related private key for each other. Public keys can be used to encrypt data and only the corresponding private key can be used To decrypt it. Although the switches are related to each other it cannot deviate from each other. In other words: if you know someone's public key, you can't take out their private key. If we recall our example mailbox, the mailbox address would be the public key Something everyone lets everyone know. The owner of the mailbox is the only one who has the private key which he is required to Open the mailbox. Let's now look at how Alice and Bob can use asymmetric encryption for communication Safely with each other. They start exchanging their public keys. Bob gives his public key to Alice and Alice gives her public key to Bob. Now Alice can send her sensitive document again. She takes the document and encrypts it with the public key.

She then sends the file to Bob, for whom he uses the private key to open and read the document that. Because it uses asymmetric encryption, only Bob can decrypt the message. Not even Alice can decrypt it because she does not have Bob's private key. The strength and security of asymmetric encryption now depends on Alice and Bob's Keep their private keys well protected. If an attacker stole Alice's private key, it could be used to decrypt all messages Dedicated to Alice. However, the messages sent by Alice could not be decrypted by the attacker because that required Bob's private key. Asymmetric encryption is used in a lot of places where security really matters. You might not be aware of it, but every time you visit a secure site via HTTPS, it is you Actually using asymmetric encryption.

It is also used to send emails securely with the PGP protocol. And a final example: Bitcoin also uses asymmetric encryption to ensure that it is only the owner From the cash purse, money can be withdrawn or transferred from it. Now you know how asymmetric encryption works and what the differences are between Asymmetric and symetric coding. If you liked this video, you want to support me, you can do so by sharing it and subscribing to my YouTube site Channel As always: Thank you very much for watching!.

You May Also Like