In Asymmetric Key Cryptography encryption and decryption, each participant possesses a private and a public key.
When one participant wants to send a secure message to another, the message is encrypted with the other person's Public Key and sent. This is safe because the only person that can decrypt the message is the one who has the Private Keys.
The other person can then send a secure message back to the first person by using the first person's Public Key. Only the person with the Private Keys can decrypt the message and that will be the first person.
Asymmetric key encryption/decryption is particularly suited to network communication because of the ease in which keys can be securely distributed.
Asymmetric Key Cryptography algorithms#Asymmetric Key Cryptography algorithms, commonly known as Public Key algorithms, use two related keys (i.e., a key pair) to perform their functions: a Public Key and a Private Key. The Public Key may be known by anyone; the Private Key should be under the sole control of the entity that "owns" the key pair. Even though the public and private keys of a key pair are related, knowledge of the Public Key cannot be used to determine the private key. Asymmetric Key Cryptography algorithms are used, for example,
More Information#There might be more information for this subject on one of the following:
- Asymmetric Key
- Certificate-based Authentication
- Cryptographic Algorithm
- Cryptographic Primitive
- Diffie-Hellman or RSA
- Digital Signature
- Glossary Of LDAP And Directory Terminology
- Key Encapsulation Method
- Key pair
- NCP Primary Authentication Protocol
- OpenID Connect Federation Async
- Private Key
- Public Key
- RSA Cryptography
- Session Key
- Transport Layer Security