Public Key Cryptography
Public key cryptography primarily comprises two processes: encryption and decryption. Encryption is the process of converting data into unreadable code so it cannot be accessed or read by any unauthorized person. This unreadable data can again be converted into a readable form by the process of decryption. Different types of algorithms are available for encryption and decryption. This section will explain the various aspects of public key cryptography, such as symmetric and asymmetric keys, and under what circumstances it is being used.
First, you need to understand the concept of symmetric and asymmetric encryption and the difference between the two. This is discussed next.
Symmetric Encryption versus Asymmetric Encryption
Encryption can be of two types: symmetric encryption or asymmetric encryption. The following table will help you understand the differences between the two terms:
Symmetric Encryption... |