RSA algorithm is the first widely used asymmetric encryption algorithm, RSA algorithm based on the decomposition of large prime number of the product of the difficulty. The newer asymmetric encryption algorithm is ECC,ECC based on the discrete logarithm problem. It can achieve the same security as RSA with less computational resource consumption. Currently, most digital certificates are still based on the RSA algorithm. If we find a method to calculate the product of prime number or discrete logarithm mathematically, it means that the corresponding asymmetric encryption algorithm is completely cracked. Before such a mathematical genius arose, we were able to use these algorithms without worry.
The symmetric encryption algorithm itself has no constraints on the value of the key, although we intentionally avoid some of the key values that are too regular. Unlike symmetric keys, asymmetric encryption algorithms cannot use arbitrary bit strings as keys. The key used for asymmetric encryption is a special large number that conforms to the principle of the algorithm. For example, the RSA algorithm's key comes from two large primes. Asymmetric private keys do not have key exchange and distribution, and asymmetric private keys should only be generated in an environment where the intended private key holder is safe and controllable. Asymmetric private keys are easier to control because they do not need to be shared with anyone else. In this way, we can establish a secure asymmetric encryption system in which only the owner of the private key can decrypt and sign the expected content.
Software or hardware modules that implement asymmetric encryption generally have the ability to generate and protect private keys. In the case of Usbkey, smart card and other cryptographic security hardware, the generation and protection of the private key will be inside these hardware. When the private key is tied to the security hardware, it is easy for the user to understand and implement the management requirements for these physical security credentials that hold the private key. When no external security hardware is available, the cryptographic package leverages the resources of the local computing platform to generate the key pair and protect the private key. Storing the private key in this form is a threat to malicious code on the computer, and its security is relatively high on the user's requirements.
This article is from the "if peak electronic technology" blog, please be sure to keep this source http://esafe.blog.51cto.com/2599735/1680711
The source of the asymmetric key