More

# IMPORTANT POINTS TO REMEMBER ABOUT ASYMMETRIC ENCRYPTION

Following are some of the most important points related to asymmetric encryption for passing exams and for general understanding.

• Asymmetric Encryption uses two mathematically related but different keys known as a key pair.
• The key pair within an asymmetric encryption is commonly referred to as a private key and a public key.Â
• In Asymmetric encryption, we can encrypt with one of the keys in the key pair and then decrypt with the other key in the key pair.
• Some of the popular algorithms used in asymmetric encryption includes RSA, Diffie-Hellman, Elliptic Curve Cryptosystem (ECC) and El Gamal.
• Asymmetric encryption takes more time to process than symmetric encryption as it is more computationally intensive than symmetric encryption.
• Asymmetric encryption works on small block sizes as compared to larger block sizes with symmetric encryption.
• Symmetric encryption is less scalable compared to asymmetric encryption due to the single shared key with symmetric encryption.
• While symmetric encryption is used for encrypting large blocks of data, asymmetric encryption is used to encrypt digital signatures and keys during key exchanges.
• Asymmetric encryption can be explained with the use case of two parties A and B where A want to send a message that only B can read, which is usually referred to as confidentiality. A will encrypt data using an asymmetric cypher (e.g. RSA) and B’s public key. B will then decrypt that message with same asymmetric cypher and B’s private key.Â
• Since asymmetric encryption is computationally intensive, in most practical cases a hybrid approach of symmetric and asymmetric encryption is used. Consider the same use case of two parties A and B where A want to send a message that only B can read. A will encrypt the message using a symmetric cypher and a session key. The session key alone is then encrypted using an asymmetric cypher (e.g. RSA) and B’s public key. Both the encrypted message and key is passed to B. B first uses the same asymmetric cypher and B’s private key to decrypt the session key and then use that session key to decrypt the actual message.

### SUMO LOGIC VIDEOS AND TUTORIALS

Sumo Logic Basics - Part 1 of 2 (link is external) (Sep 29, 2016)Sumo Logic Basics - Part 2 of 2...

### GIT – USEFUL COMMANDS

Discard all local changes, but save them for possible re-use later:  git stash Discarding local changes...

### DISTRIBUTED COMPUTING – RECORDED LECTURES (BITS)

Module 1 - INTRODUCTION Recorded Lecture - 1.1 Introduction Part I â€“ Definition

### BOOK REVIEW GUIDELINES FOR COOKBOOKS

Whenever you add reviews for the book, please follow below rules. Write issues in an excel.Create an excel...