Asymmetric encryption

With asymmetric encryption, only the private key member of the pair must be kept private and secure;  the public key can be made available to anyone without compromising the encrypted data.

Asynchronous encryption uses a key: value pair combination:

  1. The server generates its own public and private key
  2. The client generates its own public and private key
  3. Server and client exchange their public keys
  4. The server uses the client’s public key to encrypt data
  5. The client uses the server ‘s public key to encrypt data
  6. The server uses its private key to decrypt data sent by the client
  7. The client uses its private key to decrypt data sent by the server
  8. Example Algorithms/Products: EIGamal, RSA, DSA, Elliptic curve techniques, PKCS.

 

Sources: