• Uses mathematical one-way functions.
  • The private key must be kept private.
  • The public key can be openly distributed without compromising security.

Any person can encrypt a message using the public key. The encrypted message can only be decrypted with the private key.

Using public-key cryptography to enable symmetric-key cryptography

A typical example of how public-key cryptography is used to allow symmetric-key cryptography between parties.

  1. A server generates a cryptographic key that it wants to use for symmetric-key cryptography. This is faster / less resource-intensive cryptography if the key can be shared between the 2 computers that wish to securely communicate.
  2. The server uses the connecting client’s openly shared public key to encrypt this newly generated symmetric key.
  3. The server can then send this encrypted symmetric key over an insecure channel to the client.
  4. Only the client can decrypt it using the client’s private key.
  5. Once it has decrypted in, the client and server now both have the same symmetric key. They can safely use faster symmetric key encryption to communicate over otherwise insecure channels.

This scheme has the advantage of not having to manually pre-share symmetric keys while gaining the higher data throughput advantage of using symmetric-key cryptography.

USEFUL?
We benefit hugely from resources on the web so we decided we should try and give back some of our knowledge and resources to the community by opening up many of our company’s internal notes and libraries through mini sites like this. We hope you find the site helpful.
Please feel free to comment if you can add help to this page or point out issues and solutions you have found, but please note that we do not provide support on this site. If you need help with a problem please use one of the many online forums.

Comments

Your email address will not be published.