0% found this document useful (0 votes)
49 views3 pages

Asymmetric Encryption Basics

The document explains asymmetric encryption, which uses a public key for encryption and a private key for decryption, enhancing security compared to symmetric encryption. It illustrates the process through a scenario involving Tom and Jane, detailing how they can securely exchange encrypted messages. The document also emphasizes the importance of key generation and distribution for secure two-way communication.

Uploaded by

levi makokha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views3 pages

Asymmetric Encryption Basics

The document explains asymmetric encryption, which uses a public key for encryption and a private key for decryption, enhancing security compared to symmetric encryption. It illustrates the process through a scenario involving Tom and Jane, detailing how they can securely exchange encrypted messages. The document also emphasizes the importance of key generation and distribution for secure two-way communication.

Uploaded by

levi makokha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Student Name: Fenesi Ermias

Subject: Computer Science


Topic: Data Transmission

Asymmetric Encryption
Asymmetric encryption was developed to overcome the security problems
associated with symmetric encryption. It uses two different keys for encryption
and decryption:
- Public Key: Accessible to everyone and used to encrypt messages.
- Private Key: Known only to the owner and used to decrypt messages.
- The public and private keys are a matching pair, but they are mathematically
linked in such a way that one cannot be derived from the other.
- Both keys are essential for secure communication. The public key is used for
encryption, while the private key is used for decryption.

Example Scenario
- Tom and Jane's Communication: Suppose Tom wants to send a confidential
document to Jane:
1. Key Generation: Jane generates a pair of keys (public and private) and
keeps them on her computer.
2. Public Key Sharing: Jane sends her public key to Tom.

3. Encryption by Tom: Tom uses Jane’s public key to encrypt the document
and sends the encrypted document (ciphertext) back to Jane.
4. Decryption by Jane: Jane uses her private key to decrypt the document and
access the original content.

Classroom Questions
Question 1: At the moment, Jane can only receive encrypted documents from
Tom. What would need to happen for Jane to send encrypted documents back
to Tom?
Answer: Tom would need to generate his own pair of keys (public and private)
and share his public key with Jane. Jane can then use Tom’s public key to
encrypt documents, which Tom can decrypt using his private key.

Question 2: Explain why this method is much more secure than symmetric
encryption.
Answer: Asymmetric encryption is more secure because it eliminates the need
to share a single key between parties. In symmetric encryption, if the shared key
is compromised, the entire communication is at risk. Asymmetric encryption
ensures that even if the public key is intercepted, the private key remains
secure, maintaining the confidentiality of the communication.

Public Key Distribution


- Jane can share her public key with multiple people in the company (e.g., Tom,
Susan, Mike, Megan). Each of these individuals can send Jane encrypted
messages, which she can decrypt using her private key.

- For two-way communication, each person in the communication loop must


generate their own pair of keys. They must exchange public keys with each
other to ensure secure communication both ways.
Key Points for Students (to be explained by the teacher)
- Understanding Public and Private Keys: Students should grasp the concept that
the public key encrypts and the private key decrypts.
- Security Advantage: Emphasise the security benefit of not having to share the
private key, which remains confidential to the key owner.
- Real-World Application: Encourage students to think about how asymmetric
encryption is used in secure email communications, SSL/TLS in websites, and
digital signatures.

You might also like