Public Key Cryptography

Public key cryptography using a mathematically related set of two keys, one public and one private, to encrypt and decrypt data.

Data is encrypted using a public key, which is freely available to anyone, while private keys are used to decrypt ciphertext, and should be kept secret.

Public-key cryptosystems have a set of requirements which must be met by an algorithm to be viable:

Some examples of asymmetric encryption algorithms:



Subsections