Asymmetric cryptography is a method of cryptography that uses pairs of keys. Asymmetric cryptography is also known as public-key cryptography. Each pair consists of a public key (known to others) and a private key (known only to the key owner). Asymmetric cryptography uses this pair of mathematically related keys for encryption and decryption. If a public key is used for encryption, the private key must be used for decryption and vice versa. Asymmetric cryptography is primarily used for authentication and confidentiality. With asymmetric cryptography, if a message is signed with a private key, any public key holder can verify that the message was sent by the entity (person or group) possessing the corresponding private key. This key pairing can then be combined with a proof of identity system to know what entity owns that private key, providing authentication.
Want to learn more? Check out our FREE Bugcrowd University to sharpen your hacking skills.
Organizations the world over need your help! Join our researcher community to connect with hundreds of organization programs focused on finding their security vulnerabilities. Our vast directory includes programs for all skill levels, across many industries and from around the world.
Get started with Bugcrowd
Hackers aren’t waiting, so why should you? See how Bugcrowd can quickly improve your security posture.