Understanding Cryptography and It's Uses

Asymmetric cryptography is an encryption method that opposes the symmetric cryptography. It generally uses a public key (which broadcasts) to encrypt the message and a private key (kept secret) to decode the message. Thus, the sender can encrypt the message that only the recipient can decode. There are a lot of uses for this technology. A well-known coin, NEO, used the technology https://www.neonbeginner.com/2018/04/15/whatisneo/

Concept Asymmetric cryptography, or public key cryptography is based on the existence of one-way functions once the is function applied to a message, it is extremely difficult to recover the original message. In fact, such a feature is difficult to reverse, at least when you have the specific information, kept secret, called the private key. From such a function, here's how things take place: Alice wishes to receive encrypted messages to anyone. She then generates a value from a one-way function with an asymmetric encryption algorithm, for example RSA. Alice broadcasts the public key to everyone but keeps the secret decoding function (private key). Step 1: Alice generates two keys. The public key she sends to Bob and she keeps the private key without disclosing it to anyone. 2nd and 3rd stages: Bob encrypts the message with Alice's public key and sends the encrypted text. Alice decrypts the message using its private key.

Encryption One of the roles of the public key is to allow the encryption key that is therefore used for Bob to send encrypted messages to Alice. The other key - the secret information - is used to decipher. Thus, Alice, and she alone can read the message of Bob, provided that a breach was not found.

Authenticating the origin On the other hand, Bob will verify that the message is from Alice: He will apply Alice's public key to provide and thus reveal the original message. He just must compare the resulting key to the real message to see if Alice is the sender. It is thus that Bob will be reassured about the origin of the message: it belongs to Alice. On this mechanism that operates the digital signature.

Analogies The box with two locks Another analogy would be to imagine a box with two different locks. When it closes the box on one side, only the key corresponding to another lock can open the box and vice versa. One key is kept private and secret, the other is termed public and a copy may be obtained by anyone wishing to use the box. To encrypt a message Bob takes the box, places his message, and closes it using the public key. Only the owner of the private key has access to the lock, Alice in this case, will be able to reopen the box. To sign a message, Alice places her key into the box and closes it by using its private key. So anybody who retrieved the public key can open the box. But as the box was closed by the private key, that person will be assured that it is Alice. Since only she owns the key.

Applications Secure transmission of the symmetric key Asymmetric cryptography meets a major need of symmetric cryptography: the sharing of a secure key between two parties, to prevent the interception of this key by an unauthorized third party, and therefore reading the data without permission. The symmetric encryption mechanisms are less expensive on computing time, they are preferred to asymmetric encryption mechanisms. However, any use of symmetric key encryption requires that both parties share the key, i.e. know before the exchange. This can be a problem if the communication of this key is made through an unsecured medium, or in the "clear". To offset this disadvantage, it uses an encryption mechanism for the asymmetric single phase to exchange the symmetric key, and thus use it for the rest of the exchange.

Understanding cryptography and its uses in coins like neo

NEO is a next generation smart economy platform. NEO has had a monumental rise to fame and most know NEO for its explosive growth. For more...

Understanding cryptography and its uses in coins like neo

Published on May 14, 2018

NEO is a next generation smart economy platform. NEO has had a monumental rise to fame and most know NEO for its explosive growth. For more...

Advertisement