What is Asymmetric Cryptography? Definition from SearchSecurity (2024)

By

  • Kate Brush
  • Linda Rosencrance
  • Michael Cobb

What is asymmetric cryptography?

Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use.

A public key is a cryptographic key that can be used by any person to encrypt a message so that it can only be decrypted by the intended recipient with their private key. A private key -- also known as a secret key -- is shared only with key's initiator.

When someone wants to send an encrypted message, they can pull the intended recipient's public key from a public directory and use it to encrypt the message before sending it. The recipient of the message can then decrypt the message using their related private key.

If the sender encrypts the message using their private key, the message can be decrypted only using that sender's public key, thus authenticating the sender. These encryption and decryption processes happen automatically; users do not need to physically lock and unlock the message.

Many protocols rely on asymmetric cryptography, including the transport layer security (TLS) and secure sockets layer (SSL) protocols, which make HTTPS possible.

The encryption process is also used in software programs that need to establish a secure connection over an insecure network, such as browsers over the internet, or that need to validate a digital signature.

Increased data security is the primary benefit of asymmetric cryptography. It is the most secure encryption process because users are never required to reveal or share their private keys, thus decreasing the chances of a cybercriminal discovering a user's private key during transmission.

How does asymmetric cryptography work?

Asymmetric encryption uses a mathematically related pair of keys for encryption and decryption: a public key and a private key. If the public key is used for encryption, then the related private key is used for decryption. If the private key is used for encryption, then the related public key is used for decryption.

What is Asymmetric Cryptography? Definition from SearchSecurity (1)

The two participants in the asymmetric encryption workflow are the sender and the receiver. Each has its own pair of public and private keys. First, the sender obtains the receiver's public key. Next, the plaintext message is encrypted by the sender using the receiver's public key. This creates ciphertext. The ciphertext is sent to the receiver, who decrypts it with their private key, returning it to legible plaintext.

Because of the one-way nature of the encryption function, one sender is unable to read the messages of another sender, even though each has the public key of the receiver.

Uses of asymmetric cryptography

Asymmetric cryptography is typically used to authenticate data using digital signatures. A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document. It is the digital equivalent of a handwritten signature or stamped seal.

Based on asymmetric cryptography, digital signatures can provide assurances of evidence to the origin, identity and status of an electronic document, transaction or message, as well as acknowledge informed consent by the signer.

Asymmetric cryptography can also be applied to systems in which many users may need to encrypt and decrypt messages, including:

  • Encrypted email. A public key can be used to encrypt a message and a private key can be used to decrypt it.
  • SSL/TLS. Establishing encrypted links between websites and browsers also makes use of asymmetric encryption.
  • Cryptocurrencies. Bitcoin and other cryptocurrencies rely on asymmetric cryptography. Users have public keys that everyone can see and private keys that are kept secret. Bitcoin uses a cryptographic algorithm to ensure only legitimate owners can spend the funds.

In the case of the Bitcoin ledger, each unspent transaction output (UTXO) is typically associated with a public key. For example, if user X, who has an UTXO associated with his public key, wants to send the money to user Y, user X uses his private key to sign a transaction that spends the UTXO and creates a new UTXO that's associated with user Y's public key.

What are the benefits and disadvantages of asymmetric cryptography?

The benefits of asymmetric cryptography include:

  • The key distribution problem is eliminated because there's no need for exchanging keys.
  • Security is increased since the private keys don't ever have to be transmitted or revealed to anyone.
  • The use of digital signatures is enabled so that a recipient can verify that a message comes from a particular sender.
  • It allows for nonrepudiation so the sender can't deny sending a message.

Disadvantages of asymmetric cryptography include:

  • It's a slow process compared to symmetric cryptography. Therefore, it's not appropriate for decrypting bulk messages.
  • If an individual loses his private key, he can't decrypt the messages he receives.
  • Because public keys aren't authenticated, no one can ensure a public key belongs to the person specified. Consequently, users must verify that their public keys belong to them.
  • If a malicious actor identifies a person's private key, the attacker can read that individual's messages.

What's the difference between asymmetric vs. symmetric cryptography?

The main difference between asymmetric versus symmetric cryptography is that asymmetric encryption algorithms make use of two different but related keys. One key encrypts data and another key decrypts it. Symmetric encryption uses the same key to perform both encryption and decryption functions.

What is Asymmetric Cryptography? Definition from SearchSecurity (2)

Another difference between asymmetric and symmetric encryption is the length of the keys. In symmetric cryptography, the length of the keys -- which is randomly selected -- are typically set at 128 bits or 256 bits, depending on the level of security needed.

In asymmetric encryption, there must be a mathematical relationship between the public and private keys. Since malicious actors can potentially exploit this pattern to crack the encryption, asymmetric keys need to be longer to offer the same level of security. The difference in the length of the keys is so pronounced that a 2048-bit asymmetric key and a 128-bit symmetric key provide about an equivalent level of security.

Asymmetric encryption is notably slower than symmetric encryption, which has a faster execution speed.

What are examples of asymmetric cryptography?

The RSA algorithm -- the most widely used asymmetric algorithm -- is embedded in the SSL/TLS, which is used to provide secure communications over a computer network. RSA derives its security from the computational difficulty of factoring large integers that are the product of two large prime numbers.

Multiplying two large primes is easy, but the difficulty of determining the original numbers from the product -- factoring -- forms the basis of public-key cryptography security. The time it takes to factor the product of two sufficiently large primes is beyond the capabilities of most attackers.

RSA keys are typically 1024 or 2048 bits long, but experts believe 1024-bit keys will be broken soon, which is why government and industry are moving to a minimum key length of 2048-bits.

Elliptic Curve Cryptography (ECC) is gaining favor with many security experts as an alternative to RSA. ECC is a public-key encryption technique based on elliptic curve theory. It can create faster, smaller and more efficient cryptographic keys through the properties of the elliptic curve equation.

To break ECC, an attacker must compute an elliptic curve discrete logarithm, which is significantly more difficult problem than factoring. As a result, ECC key sizes can be significantly smaller than those required by RSA while still delivering equivalent security with lower computing power and battery resource usage.

What's the history of asymmetric cryptography?

Whitfield Diffie and Martin Hellman, researchers at Stanford University, first publicly proposed asymmetric encryption in their 1977 paper, "New Directions in Cryptography."

The concept was independently and covertly proposed by James Ellis several years earlier, while he was working for the Government Communications Headquarters (GCHQ), the British intelligence and security organization. The asymmetric algorithm as outlined in the Diffie-Hellman paper uses numbers raised to specific powers to produce decryption keys. Diffie and Hellman initially teamed up in 1974 to solve the problem of key distribution.

The RSA algorithm, which was based on the work of Diffie, was named after its three inventors -- Ronald Rivest, Adi Shamir and Leonard Adleman. They invented the RSA algorithm in 1977 and published it in Communications of the ACM in 1978.

This was last updated in September 2021

Continue Reading About asymmetric cryptography (public key cryptography)

  • Cryptography basics: Symmetric key encryption algorithms
  • How to secure data at rest, in use and in motion
  • Quantum computers mean cryptography needs to change, and soon
  • Data security guide: Everything you need to know

Related Terms

cybersecurity
Cybersecurity is the practice of protecting internet-connected systems such as hardware, software and data from cyberthreats.Seecompletedefinition
data broker (information broker)
A data broker, also called an information broker or information reseller, is a business that collects large amounts of personal ...Seecompletedefinition
phishing
Phishing is a fraudulent practice in which an attacker masquerades as a reputable entity or person in an email or other form of ...Seecompletedefinition

Dig Deeper on Data security and privacy

  • Advanced Encryption Standard (AES)By: RahulAwati
  • encryptionBy: RobertSheldon
  • cryptosystemBy: CorinneBernstein
  • Explore the impact of quantum computing on cryptographyBy: RyanArel
What is Asymmetric Cryptography? Definition from SearchSecurity (2024)

FAQs

What is Asymmetric Cryptography? Definition from SearchSecurity? ›

Public key cryptography, also known as asymmetric cryptography, uses two different but mathematically linked keys -- one public and one private. The public key can be shared with everyone, whereas the private key must be kept secret. RSA is a type of asymmetric encryption, which uses two different but linked keys.

What is the short definition of asymmetric cryptography? ›

Asymmetric encryption (also known as asymmetric cryptography) allows users to encrypt information using shared keys. You need to send a message across the internet, but you don't want anyone but the intended recipient to see what you've written. Asymmetric encryption can help you achieve that goal.

What is asymmetric key cryptography for dummies? ›

Asymmetric encryption uses a mathematically related pair of keys for encryption and decryption: a public key and a private key. If the public key is used for encryption, then the related private key is used for decryption. If the private key is used for encryption, then the related public key is used for decryption.

What is an example of asymmetric encryption? ›

Common Asymmetric Encryption Algorithms. Common asymmetric encryption algorithms are essential in secure communication and data transmission. Examples of these algorithms include RSA, Diffie-Hellman, and Elliptic Curve Cryptography (ECC).

What is the primary difference between symmetric and asymmetric encryption? ›

Symmetric encryption uses the same key to both encrypt and decrypt data, while asymmetric encryption uses two different keys for the same purpose. Symmetric encryption is faster and easier to use than asymmetric encryption, but it is less secure. If the key is compromised, the data can be easily decrypted.

What is asymmetric information in simple words? ›

"Asymmetric information" is a term that refers to when one party in a transaction is in possession of more information than the other. In certain transactions, sellers can take advantage of buyers because asymmetric information exists whereby the seller has more knowledge of the good being sold than the buyer.

What is a benefit of using asymmetric cryptography? ›

Secure communication: Asymmetric encryption allows for secure communication between two parties without the need for a shared secret key.

Who holds the private key in asymmetric cryptography? ›

Asymmetric encryption algorithms use two different keys for encryption and decryption. The key used for encryption is the public key, and the key used for decryption is the private key. Both the keys must belong to the receiver.

What are two functions of asymmetric key cryptography? ›

Applications
  • Encryption / Decryption: Messages are encrypted using the recipient's public key, ensuring only the intended recipient can decrypt it.
  • Digital Signature: Senders authenticate messages by signing them with their private key, verifying their identity and ensuring message integrity.
May 2, 2024

What are the two main types of cryptography? ›

Cryptography can be broken down into three different types:
  • Secret Key Cryptography.
  • Public Key Cryptography.
  • Hash Functions.

Can asymmetric encryption be hacked? ›

Hackers deploy different approaches depending on whether the encryption is symmetric or asymmetric. In case of symmetric encryption, cypher-text attacks can be used to break the encryption, while with asymmetric encryption, they may try to mathematically solve the algorithmic puzzle.

What is the most popular asymmetric encryption? ›

RSA (Rivest Shamir Adleman) — RSA is considered one of the most secure (and commonly used) asymmetric key encryption algorithms. It's virtually uncrackable using modern computers.

Can asymmetric encryption be cracked? ›

Yes, decrypting RSA-encrypted messages is possible, but it requires the appropriate private key.

When would you use asymmetric encryption? ›

Digital Signing: Asymmetric encryption is much better for digital signing, compared to symmetric encryption. The use of both a public and private key means the identity of the signer of the data can easily be known.

What type of cryptography is more secure? ›

Public key cryptography is considered to be more secure than symmetric encryption techniques because even though one key is publicly available, an encrypted message can only be decrypted with the intended recipient's private key.

What type of cryptography will a bank site use? ›

Symmetric-key cryptography is commonly used in electronic banking transactions. When a customer initiates a transaction, the bank encrypts the transaction data using a symmetric key that is shared between the bank and the customer. The customer can then decrypt the data using the same key to verify the transaction.

What is symmetric key cryptography in simple words? ›

In cryptography, a symmetric key is one that is used both to encrypt and decrypt information. This means that to decrypt information, one must have the same key that was used to encrypt it.

What is asymmetric cryptography one way function? ›

In asymmetric cryptography, the trapdoor one-way function formula used for message encryption becomes the public key, and the secret information (trapdoor) used to compute its inverse becomes the private key.

What is an accurate description of asymmetric encryption technology? ›

Asymmetric encryption, also known as public-key cryptography, uses two separate keys to encrypt and decrypt data. One is a public key shared among all parties for encryption. Anyone with the public key can then send an encrypted message, but only the holders of the second, private key can decrypt the message.

What is asymmetric cryptography in Blockchain? ›

The core technologies of cryptography include symmetric encryption and asymmetric encryption. Asymmetric cryptography uses digital signatures for verification purposes, every transaction recorded to the block is signed by the sender by digital signature and ensures that the data is not corrupted.

Top Articles
Latest Posts
Article information

Author: Virgilio Hermann JD

Last Updated:

Views: 6090

Rating: 4 / 5 (41 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Virgilio Hermann JD

Birthday: 1997-12-21

Address: 6946 Schoen Cove, Sipesshire, MO 55944

Phone: +3763365785260

Job: Accounting Engineer

Hobby: Web surfing, Rafting, Dowsing, Stand-up comedy, Ghost hunting, Swimming, Amateur radio

Introduction: My name is Virgilio Hermann JD, I am a fine, gifted, beautiful, encouraging, kind, talented, zealous person who loves writing and wants to share my knowledge and understanding with you.