27 - Asymmetric Encryption Flashcards
What is asymmetric encryption?
A cryptosystem using public/private key pairs.
What does a generic key pair consist of?
- Public key (everyone knows this key)
- Private key (only the designated person knows this key)
- Unique to the user
What two Pillars of Cybersecurity does Asymmetric Encryption provide?
- Confidentiality
- Authentication
In Asymmetric Encryption, it requires the layering of the use of public and private keys to ensure information is going to the right user
Example of Encrypted Communication
Bob has an authentication problem on his hands. Yes, he’s received a message only he could read, and the message claims to have been sent by Alice, but he has no guarantees that it really did come from Alice. Anyone can send a message to Bob using Bob’s public key, since it’s freely available.
Example of Authenticated Communications
Bob’s authentication problem is solved. However, Eve, or anyone else seeing the encrypted message, could decrypt it using Alice’s public key, which is freely available, so the message’s confidentiality is not guaranteed.
Example of Encrypted and Authenticated Communications