How does Asymmetrical Encryption Work??

gumbob3

Commendable
Mar 5, 2016
12
0
1,560
0
It doesn't make sense as to how one key can encrypt, and another will decrypt. Won't the decryption key always be the opposite of the encryption key?
 

Eximo

Distinguished
Herald
It depends on the exact algorithm used for encryption, but a decryption does not have to be identical to the encryption (though that is a poor way to say it)

But what I think you are referring to are the common public/private key exchanges that take place between individuals, CA, and servers, etc.

Basically you make an encryption with more than one answer, but only give one answer to a second party. As long as the originating party keeps their half 'private' you always know messages, or what have you, come from them.
 

grmnlxndr

Honorable
May 17, 2012
81
0
10,610
19
Basically it uses 2 prime numbers in order to generate big numbers that are difficult to factorize. It uses the mathematical "features" that prime numbers have in order to obtain the 2 keys. The exact functionality is a bit difficult to explain, but you can see here at this wikipedia entry for RSA (an asymmetrical encryption algorithm):

https://en.wikipedia.org/wiki/RSA_(cryptosystem)

Regards
 

Shoomer

Commendable
Oct 8, 2016
64
0
1,610
14
Asymmetrical Encryption has two 'keys' and one 'lock' One key is 'private' the other 'key' is public. In simple terms the public key is linked to a private key. You can't decode without both.
 
Thread starter Similar threads Forum Replies Date
D Antivirus / Security / Privacy 3
H Antivirus / Security / Privacy 4
J Antivirus / Security / Privacy 9
T Antivirus / Security / Privacy 4
M Antivirus / Security / Privacy 1
S Antivirus / Security / Privacy 10
H Antivirus / Security / Privacy 2
Tanyac Antivirus / Security / Privacy 2
tarmiricmi Antivirus / Security / Privacy 2
P Antivirus / Security / Privacy 1
F Antivirus / Security / Privacy 1
tarmiricmi Antivirus / Security / Privacy 1
T Antivirus / Security / Privacy 1
B Antivirus / Security / Privacy 1
T Antivirus / Security / Privacy 1
A Antivirus / Security / Privacy 2
C Antivirus / Security / Privacy 1
K Antivirus / Security / Privacy 1
M Antivirus / Security / Privacy 5
S Antivirus / Security / Privacy 4

ASK THE COMMUNITY