{"id":2456,"date":"2021-06-25T12:24:33","date_gmt":"2021-06-25T11:24:33","guid":{"rendered":"https:\/\/ibex.tech\/resources\/?p=2456"},"modified":"2022-02-18T15:05:15","modified_gmt":"2022-02-18T15:05:15","slug":"public-key-cryptography","status":"publish","type":"post","link":"https:\/\/ibex.tech\/resources\/geek-area\/security\/public-key-cryptography","title":{"rendered":"Public-key cryptography"},"content":{"rendered":"\n<ul class=\"wp-block-list\"><li>Uses mathematical one-way functions.<\/li><li>The private key must be kept private.<\/li><li>The public key can be openly distributed without compromising security.<\/li><\/ul>\n\n\n\n<p>Any person can encrypt a message using the public key.  The encrypted message can only be decrypted with the private key.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Using public-key cryptography to enable symmetric-key cryptography<\/h4>\n\n\n\n<p>A typical example of how public-key cryptography is used to allow symmetric-key cryptography between parties.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>A server generates a cryptographic key that it wants to use for symmetric-key cryptography.  This is faster \/ less resource-intensive cryptography if the key can be shared between the 2 computers that wish to securely communicate.<\/li><li>The server uses the connecting client&#8217;s openly shared public key to encrypt this newly generated symmetric key. <\/li><li>The server can then send this encrypted symmetric key over an insecure channel to the client.<\/li><li>Only the client can decrypt it using the client&#8217;s private key.<\/li><li>Once it has decrypted in, the client and server now both have the same symmetric key.  They can safely use faster symmetric key encryption to communicate over otherwise insecure channels.<\/li><\/ol>\n\n\n\n<p>This scheme has the advantage of not having to manually pre-share symmetric keys while gaining the higher data throughput advantage of using symmetric-key cryptography.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Uses mathematical one-way functions. The private key must be kept private. The public key can be openly distributed without compromising security. Any person can encrypt a message using the public key. The encrypted message can only be decrypted with the private key. Using public-key cryptography to enable symmetric-key cryptography A typical example of how public-key [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[116],"tags":[],"class_list":["post-2456","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/ibex.tech\/resources\/wp-json\/wp\/v2\/posts\/2456","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ibex.tech\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ibex.tech\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ibex.tech\/resources\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ibex.tech\/resources\/wp-json\/wp\/v2\/comments?post=2456"}],"version-history":[{"count":2,"href":"https:\/\/ibex.tech\/resources\/wp-json\/wp\/v2\/posts\/2456\/revisions"}],"predecessor-version":[{"id":2459,"href":"https:\/\/ibex.tech\/resources\/wp-json\/wp\/v2\/posts\/2456\/revisions\/2459"}],"wp:attachment":[{"href":"https:\/\/ibex.tech\/resources\/wp-json\/wp\/v2\/media?parent=2456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ibex.tech\/resources\/wp-json\/wp\/v2\/categories?post=2456"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ibex.tech\/resources\/wp-json\/wp\/v2\/tags?post=2456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}