Delving into asymmetric encryption algorithms
Asymmetric algorithms perform data encryption by using two different keys in the form of a key pair. This means that one key is used to encrypt the data while another is used to decrypt the message. If either key is lost or stolen, the message is not compromised.
The following diagram shows a user, Alice, using a key to encrypt the plaintext message:
When the destination host, Bob, receives the message from the sender, Bob will use a different key to decipher the message, as shown in the following diagram:
Asymmetric algorithms use a key pair known as a public and private key. The public key is given to anyone who wants to communicate with you, hence the name public key. The private key is kept by you. Only users of the key pair are able to encrypt and decrypt...