What is Asymmetric Encryption?
An encryption method using a pair of mathematically related keys: a public key for encryption and a private key for decryption. This solves the key distribution problem of symmetric encryption.
Also known as: Public Key Encryption, PKE
Asymmetric encryption uses two keys that are mathematically linked but computationally impossible to derive from each other. What one key encrypts, only the other can decrypt.
The Key Pair
Public Key
- Freely shared with anyone
- Used to encrypt messages TO the owner
- Cannot decrypt what it encrypts
Private Key
- Kept absolutely secret
- Used to decrypt messages
- Never shared with anyone
How It Works
- Alice generates a key pair (public + private)
- Alice shares her public key openly
- Bob encrypts a message using Alice's public key
- Only Alice's private key can decrypt it
- Even Bob can't decrypt what he just encrypted!
Why It's Revolutionary
Before asymmetric encryption, secure communication required:
- Meeting in person to exchange keys
- Trusted couriers
- Pre-shared secrets
Now two strangers can communicate securely without ever meeting.
Common Algorithms
- RSA: The original, still widely used
- ECC (Elliptic Curve): Smaller keys, same security
- ElGamal: Used in PGP
- Diffie-Hellman: Key exchange protocol
Trade-offs
- Slower than symmetric encryption (1000x or more)
- Larger keys needed for equivalent security
- Usually combined with symmetric encryption in practice
Hybrid Encryption
Most real-world systems use both:
- Asymmetric to exchange a symmetric key
- Symmetric for the actual data (fast)
- Best of both worlds
Related Terms
Encryption
The process of converting information into a code to prevent unauthorized access. Encryption transforms readable data (plaintext) into an unreadable format (ciphertext) using a cryptographic algorithm and key. Only those with the correct key can decrypt and read the original data.
Public Key Cryptography
A cryptographic system that uses pairs of keys: public keys (which may be disseminated widely) and private keys (which are known only to the owner). This enables secure communication between parties who have never met and forms the basis for digital signatures, key exchange, and encrypted communication.
RSA
One of the first public-key cryptosystems, RSA is based on the mathematical difficulty of factoring large prime numbers. Named after its inventors Rivest, Shamir, and Adleman, it's still widely used for key exchange and digital signatures.
Have more questions?
Use our guided flow to get the right next privacy step for Asymmetric Encryption.
Open Guided Flow