Encyclopedia

asymmetric cryptography

Also found in: Dictionary, Medical, Financial.

asymmetric cryptography

A very popular encryption method that uses two keys: a public key and a private key. When a message is sent to a person who is the only one entitled to view it, the sender uses the recipient's public key to encrypt the message. The recipients use their private (secret) keys to decrypt the message.

With digital signatures, the sender's private key is used to encrypt a digest of the message, and the sender's public key is used to decrypt it. Contrast with symmetric cryptography, which uses the same key at both ends. See public key cryptography, digital signature and RSA.
Copyright © 1981-2025 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
Mentioned in
References in periodicals archive
Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures.
In 1993 new ideas appeared in asymmetric cryptography [6]--using known hard computational problems in infinite non-commutative groups instead of hard number theory problems such as discrete logarithm or integer factorization problems.
According to the information of this work, asymmetric cryptography brings many disadvantages when used in key distribution protocols.
Asymmetric cryptography has the drawback of being relatively computation and communication intensive.
Coverage includes the mathematical basics of symmetric and asymmetric cryptography, the synthesis of block ciphers, and software-oriented ciphers.
(6) Digital signatures are based on public key technology, a special form of encryption invented in the 1970s, which uses two different keys (as two different keys are used, this form of encryption is also known as asymmetric cryptography).
A digital signature relies on the mathematically complex world of asymmetric cryptography. In use for many years to provide encryption of messages for security, the same technology is used to create a virtual signature.
Copyright © 2003-2025 Farlex, Inc Disclaimer
All content on this website, including dictionary, thesaurus, literature, geography, and other reference data is for informational purposes only. This information should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional.