asymmetric encryption

agnusdei·2025년 9월 3일

CTF

목록 보기
80/185


1️⃣ Overview

Asymmetric Encryption (also called public-key cryptography) uses two different keys for encryption and decryption:

  • Public Key: Available to anyone; used to encrypt data.
  • Private Key: Kept secret by the owner; used to decrypt data.

Unlike symmetric encryption, where the same key is used for both encryption and decryption, asymmetric encryption allows secure key distribution without a shared secret.


2️⃣ Key Characteristics

FeatureDescriptionTechnical Perspective
Key PairUses Public & Private KeysPublic Key can be shared; Private Key must remain secret
SecurityResistant to interception attacksData can be encrypted safely without a secure channel
SpeedSlower than symmetric encryptionTypically used for key exchange, not bulk data encryption
ApplicationsDigital signatures, authentication, key exchangeTLS/SSL, PGP, SSH, X.509 certificates

3️⃣ How It Works

① Data Encryption

  1. Sender A obtains the receiver B’s public key.
  2. A encrypts the message using B’s public key.
  3. Encrypted message is sent to B.
  4. B decrypts the message with their private key.

② Digital Signature

  1. Sender A creates a hash of the message.
  2. A encrypts the hash with their private key → digital signature.
  3. Receiver B verifies the signature using A’s public key.
  4. Ensures message integrity and sender authentication.

4️⃣ Common Algorithms

  • RSA: Most widely used; security increases with key length.
  • ECC (Elliptic Curve Cryptography): Provides same security as RSA with shorter keys; ideal for mobile/IoT.
  • DSA (Digital Signature Algorithm): Specifically for digital signatures.

5️⃣ Technical-Level Insights

  1. Key Management is Critical

    • If the private key is leaked, encryption and digital signatures are compromised.
    • Use Hardware Security Modules (HSMs) for secure storage.
  2. Practical Applications

    • Data Transfer: Use asymmetric encryption to exchange session keys; actual data encrypted with symmetric keys.
    • Authentication: Public-key certificates (X.509) for TLS or SSH.
    • Digital Signatures: Ensure integrity and non-repudiation.
  3. Performance Optimization

    • Asymmetric encryption is computationally expensive.
    • Use hybrid cryptography: asymmetric encryption for key exchange, symmetric encryption (e.g., AES) for bulk data.

6️⃣ Summary

  • Definition: Uses two different keys (public/private) for encryption and decryption.
  • Advantages: Secure key distribution, authentication, integrity verification.
  • Disadvantages: Slower than symmetric encryption → hybrid approach recommended.
  • Real-World Use: TLS/SSL, SSH, PGP, digital signatures, certificate-based authentication.

profile
DevSecOps, Pentest, Cloud(OpenStack), Develop, Data Engineering, AI-Agent

0개의 댓글