Cryptography
Encryption protocols
| Symmetric | Asymmetric |
|---|---|
|
|
. System-1 System-2
#Encryption decryption
download
[data encrypted] -----> [data decrypted]
- with public2 key - with private2 key
#Signing
[data encrypted] -----> [data decrypted]
- with public2 key - with private2 key
- signed with private1 key - verified signature with public1 key
#Note, where needed the public key exchange happen, eg. via CA distribution process or protocol initialisation etc.
- Signing
- if you sign anything with private key, the only way to verify the signature is to decrypt with the matching public key.