Public Key or asymmetric encryption
Public-Key or asypolicric Cryptography)
Public Key Cryptography provides a secure way for computer users to exchange information. The public key encryption standard is a standard developed by the RSA laboratory by security system developers around the world. Currently, PKCS is widely used, and some standard documents are part of formal or informal standards, including ANSI X9 documents, PKIX, SET, S/MIME, and SSL. Public key Encryption is also called Asymmetric Encryption asypolicric Encryption. It is based on the mathematical model developed by Diffie and Hellman.
Public key encryption technology allows anyone to encrypt the information and send it to another person without the need to exchange the key in advance. However, this process is not feasible between two people who know each other or belong to the same organization. To exchange sensitive data packets over the Internet during public key encryption, two types of key support are required: public key and private key. The Public Key is made public by its owner, and the private key must be kept confidential. To send a confidential message, the sender must use the recipient's public key to encrypt the data. Once encrypted, only the recipient can use its private key to decrypt the data. In other words, if A wants to send encrypted data to B, A uses B's public key to encrypt the data to be sent, B uses the corresponding private key to decrypt the encrypted data sent by.
On the contrary, users can use their own private keys to process data encrypted with public keys. However, this method is not very useful for encrypting sensitive packets because everyone can obtain the public key to decrypt the information. However, it can be applied to the following scenario: when a user wants to process data with his/her own private key, he/she can use the public key provided by the user to process the data, this provides the basis for "Digital Signature.
Public Key Infrastructure (PKI) is a system that provides Public Key creation and management based on the above basic concepts. It supports efficient data encryption and Key exchange processes.
Public Key or asymmetric encryption