Public Key Cryptography

Full information security has become one of the main goals of modern society. And it cannot be provided without effective methods of encrypting information. But the classical methods, such as symmetric cryptography, even though they provided a high level of resistance to hacking, but were not very convenient for active and regular use. Therefore, a revolutionary new approach was invented - public key cryptography.

What is it, exactly?

Asymmetric encryption works according to the following principles:

In fact, this is achieved by using a so-called "one-way function". It is so called because it cannot be calculated, even knowing an unlimited number of its possible points. Only the presence of the so-called "loophole" - the private key - makes this process possible.

Advantages and disadvantages

The advantages of this method of data protection are as follows:

It also has some rather significant disadvantages:

The length is larger due to the fact that there is a direct pattern between the public and private keys, which can be trivially selected. Therefore, for the level of security that gives a symmetric key with a length of 128 bits (the minimum actually used), an asymmetric key of the order of 2304 bits is required. It is inconvenient to work with such sizes, so the process is generally slower.

In addition, despite its high stability, this method of encoding information can still be hacked. Two methods are most often used.

The first is the actual computation of a private key from known public keys. If the algorithm used is known and the hacker has several ciphertexts at his disposal, then hacking becomes technically possible. Especially with the use of modern technological tools.

The second is the wedging of a third party into the process of transferring encrypted data, replacing the transmitted public keys with their own and decrypting messages at the expense of their own private ones. However, this method does not work in a situation where secure certificates are used.

Asymmetric encryption and the Bitcoin blockchain

Despite the fact that Bitcoin uses pairs of public and private keys, it does not specifically use asymmetric encryption. In contrast to the second common practical application of asymmetric cryptography - digital signatures. That means, any message within the blockchain may not be encrypted, but is necessarily digitally signed as an identifier. This is because the more secure ECDSA algorithm is used, which does not provide additional encoding, in contrast to the simpler but functional RSA algorithm.

Modern use

At the current moment, the most famous options for using such encryption methods are as follows:

In addition, similar encryption methods are used to create hybrid systems that combine the best of the two existing methods of encoding information. As examples, we can name Security Sockets Layer (SSL) and Transport Layer Security (TLS), which formed the basis for creating secure communication channels on the Internet. In particular, the HTTPs protocol.