Two Keys, One System
Asymmetric encryption uses a key pair: a public key (shareable) and a private key (secret). What one encrypts, only the other can decrypt.
Public Key Encryption
Encryption: Plaintext + Public Key → Ciphertext Decryption: Ciphertext + Private Key → Plaintext Anyone can encrypt with public key Only private key holder can decrypt
Algorithms
RSA
Based on factoring large primes
ClassicECC
Elliptic Curve - smaller keys, same security
ModernEd25519
Fast, secure curve for signatures
SignaturesX25519
Efficient key exchange
Key ExchangeRSA vs ECC
| Aspect | RSA | ECC |
|---|---|---|
| Key Size (128-bit security) | 3072 bits | 256 bits |
| Speed | Slower | Faster |
| Maturity | Well-studied | Newer |
| Quantum Resistance | No | No |
Use Cases
- Key Exchange - establish shared symmetric keys
- Digital Signatures - prove authenticity
- TLS/SSL - secure web connections
- PGP/GPG - email encryption
- SSH - secure remote access
Limitations
Performance: Asymmetric encryption is 100-1000x slower than symmetric. In practice, it's used to exchange symmetric keys, which then encrypt the actual data (hybrid encryption).