Abstract
We previously mentioned a second type of encryption called asymmetric key (or public/private key) cryptography. This is much more recent than symmetric key, and involves some complex math. It is far slower than symmetric key, hence not suitable for encryption of large documents (normally it only encrypts 128 to 512 bits). It is however, well suited to key management. Unlike symmetric key that uses the same key for encryption and decryption, asymmetric key uses a matched pair of keys (one public, one private) for each user. This is not intuitive as is symmetric key. You don’t lock you house with one key and unlock it with a different key. Asymmetric key cryptography is central to many real-world cryptographic systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature
About this chapter
Cite this chapter
Hughes, L.E. (2022). Basic Cryptography: Asymmetric Key Encryption. In: Pro Active Directory Certificate Services. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-7486-6_3
Download citation
DOI: https://doi.org/10.1007/978-1-4842-7486-6_3
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-7488-0
Online ISBN: 978-1-4842-7486-6
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)