paint-brush
How Does Symmetric and Asymmetric Public Key Cryptography Work? by@Shiva
1,136 reads
1,136 reads

How Does Symmetric and Asymmetric Public Key Cryptography Work?

by Shiva Sai Kumar BFebruary 14th, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

There are two types of Cryptography: Symmetric cryptography and Asymmetric Cryptography. Cryptography encodes the message in a way that no one can decrypt it except the receiver. This keeps the data safe from an eavesdropper, where they cannot read and understand the format. The Receiver uses the Receiver’s username to send the data to them and reads the data. This makes the system safe from eavesdroppers and more robust. Asymmetry Cryptography uses Key-pairs to decrypt the data and uses a single key to encrypt and decrypt.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - How Does Symmetric and Asymmetric Public Key Cryptography Work?
Shiva Sai Kumar B HackerNoon profile picture
Cryptography makes Blockchain Technology more robust and stands out from other technology. Cryptography which uses advance mathematical principles method in transmitting and storing the data, it stores in a way that only the person for whom the data is intended can read and process it.
"Encryption is the core concept in cryptography- It encodes the message in a way that no one can decrypt it except the receiver, it keeps the data safe from an eavesdropper, where they cannot read and understand the format".
Quick intro of this technique, this was first used by Caesar to encrypt his messages using Caesar cipher, where a plain text is encrypted to cipher text and then send through the communication channel and no eavesdropper can read and understand the text. When it receives at the receiver end it decrypted to plain text from the cipher text.

There are two types of Cryptography:

1. Symmetric cryptography2. Asymmetric cryptography

Symmetric cryptography
Symmetric cryptography is same as the Caesar Cipher Technique, where uses a single key to encrypt and decrypt the data. I have created a visualization of this process for a better idea.

But Symmetric Cryptography has some drawbacks...

Both persons should have to use the same key, there is no problem of using the same key but the problem comes, when we want to share the key from an eavesdropper, this is the difficult task.We are using the Symmetric Cryptography for the safe transfer of the data from eavesdroppers, but we have to share the key to the receiver person. If the receiver is living by we can give it to him directly in an envelope or other sources, what if the person is from a different state or country. It becomes difficult, so to overcome this problem there is one more technique called Asymmetric Cryptography.This Asymmetric Cryptography, we use in Blockchain Technology.

Asymmetric Cryptography

Asymmetric Cryptography makes the Blockchain technology more Robust mechanism and solves the drawback of Symmetric Cryptography.
"Asymmetric Cryptography is a bit more complex than the Symmetric Cryptograph and the main difference between these both his, Symmetric uses the shared key to decrypt the data and Asymmetric uses Key-pairs to decrypt the data".
Key pairs consists of 2 parts, a public key and a private key.Let’s take an example of Gmail If we need to send a mail to the person or company.1. Every user in Gmail has specially allocated username and a password.2. They use the Receiver’s username to send the data to them. 3. The Receiver receives the message from the sender and reads the data.The same process applies with Asymmetric Cryptography,"Every user has Public key which is same as your username, Every person can see this but don’t have access to the data and Private key is same as your password, which helps you to send the data to another person".

To the send the data first we will use the private key (i.e password) and receivers public key(i.e username) this makes the cryptography technique more complex.

Now receiver uses his private key (i.e password) and senders public key (i.e username) to decrypt the data. This makes the system safe from eavesdropper and more robust.

There is no need to have an intermediate and we can send to any person in this world.I have created a visualization of this process for a better idea.

Digital Signatures

Now when I send a mail through my mail id the receiver knows that I have sent to him by seeing the username. I cannot send the data without password i.e if any mail you’re sending through your username, you’re responsible for that. No one can access your account without the password.In the same way without the private key, no one can send a message through your public key, if any message you have sent through its your responsibility for that because without private key no one can send the message through your address. We have to be more careful because for Gmail we have a central database to retrieve our password but Blockchain is decentralized, you need to keep your private key more safely.When we send data using our privet key, it is signed by our Digital Signature and it allows non-repudiation as it means the person who sent the message had to be in possession of the private key.
"If you encrypt (“lock”) something with your private key, anyone can decrypt it (“unlock”), but this serves as a proof you encrypted it: it’s “digitally signed” by you. — PanayotisVryonis"


바카라사이트 바카라사이트 온라인바카라