Overview
Also known as public-key cryptography, asymmetric encryption solves the key distribution problem of symmetric encryption. The public key can be shared openly, while the private key must be kept secret.
How it Works
Data encrypted with the public key can only be decrypted with the corresponding private key. Conversely, data 'signed' with the private key can be verified with the public key.
Common Algorithms
- RSA: One of the oldest and most widely used asymmetric algorithms.
- ECC (Elliptic Curve Cryptography): Provides similar security to RSA with much smaller key sizes.
- Diffie-Hellman: A protocol for secure key exchange.
Use Cases
- Digital signatures.
- Secure key exchange for symmetric encryption.
- Identity verification in PKI.