{"id":2283,"date":"2014-03-24T11:00:00","date_gmt":"2014-03-24T15:00:00","guid":{"rendered":"http:\/\/sqlity.net\/en\/?p=2283"},"modified":"2014-11-13T13:10:06","modified_gmt":"2014-11-13T18:10:06","slug":"asymmetric-key","status":"publish","type":"post","link":"https:\/\/sqlity.net\/en\/2283\/asymmetric-key\/","title":{"rendered":"Asymmetric Key Encryption"},"content":{"rendered":"<div>\n<div style=\"float:left;padding:20px;\">\n<a href=\"http:\/\/sqlity.net\/wp-content\/uploads\/2014\/03\/asymmetric_key_encryption.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/sqlity.net\/wp-content\/uploads\/2014\/03\/asymmetric_key_encryption.jpg\" alt=\"Asymmetric Key Encryption\" title=\"Asymmetric Key Encryption\" width=\"240\" height=\"160\" class=\"aligncenter size-full wp-image-2284\" srcset=\"https:\/\/sqlity.net\/wp-content\/uploads\/2014\/03\/asymmetric_key_encryption.jpg 480w, https:\/\/sqlity.net\/wp-content\/uploads\/2014\/03\/asymmetric_key_encryption-300x200.jpg 300w, https:\/\/sqlity.net\/wp-content\/uploads\/2014\/03\/asymmetric_key_encryption-150x100.jpg 150w\" sizes=\"auto, (max-width: 240px) 100vw, 240px\" \/><\/a>\n<\/div>\n<h3>Introduction<\/h3>\n<p>\nYesterday I introduced <a href=\"http:\/\/sqlity.net\/en\/2278\/symmetric-key\/\">Symmetric Key Encryption<\/a>. In that article I also mentioned Asymmetric Key encryption. Asymmetric key encryption is the topic of this article.\n<\/p>\n<h3>Asymmetric Key Encryption<\/h3>\n<p>\nThe same principles discussed yesterday that you should pay attention too when selecting a symmetric key encryption algorithm hold true for asymmetric key encryption as well. In particular, experience has taught that only fully published algorithms can be trusted in the long term. Algorithms that require the algorithm itself to be kept a secret will fail eventually.\n<\/p>\n<p>\nWhen using symmetric key encryption, both parties, the sender and the receiver of an encrypted message, must have knowledge of the key. That can pose a problem as the key needs to be transferred from one to the other, without it being revealed to any adversary on the way. However, if there is a way to securely transmit the key, we could just transmit the message itself and not encrypt it at all.\n<\/p>\n<p>\nThere is a family of encryption algorithms that solve that problem: Algorithms for Asymmetric Key Encryption. For asymmetric key encryption the receiver and the sender both have separate keys. The sender has a key that is used for the encryption step. That key however cannot be used to decrypt the message, nor can it be used to derive the other key. Because of these properties, it is safe to publish the encrypting key. The receiver on the other hand has a second key that can decrypt any message that was encrypted with its counterpart.\n<\/p>\n<h3>A Public Key<\/h3>\n<p>\nBecause the encrypting key can actually be public knowledge, it is safe to publish it. That allows anyone to encrypt a message that only the legitimate receiver can decrypt. Because of that, the published key is called \"public key\" and asymmetric key encryption is often referred to as public-key encryption. The decrypting key on the other hand must be kept secret at all times and is therefore call \"private key\".\n<\/p>\n<p>\nIf asymmetric key encryption algorithms exist, why do we use symmetric key encryption at all? The reason is one significant disadvantage: Asymmetric key encryption is significantly slower. To get to the same level of protection that a say a 256-bit symmetric key provides you have to use 4096 bits or more for your asymmetric key and with that performance suffers.\n<\/p>\n<p>\nTo get the best of both worlds, public-key encryption is often used to encrypt a newly generated random key that then can be safely transmitted and afterwards used with symmetric key encryption.\n<\/p>\n<p>\nThe most commonly used asymmetric key encryption system is RSA named after the three inventors Ron Rivest, Adi Shamir and Leonard Adleman.\n<\/p>\n<h3>Summary<\/h3>\n<p>\nSymmetric key encryption suffers from the problem that the same key needs to be known by both the sending and the receiving party. Therefore, there needs to be a secure way to exchange the key. Asymmetric key or public-key encryption gets around that by using two different keys, one of which can be published.\n<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Asymmetric key encryption (aka public-key encryption) works with two separate keys, a public key to encrypt and a private key to decrypt. Read on to see the advantages and disadvantages of this type of encryption.<\/p>\n<p> <a href=\"https:\/\/sqlity.net\/en\/2283\/asymmetric-key\/\">[more&#8230;]<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[139,32,5,34,27],"tags":[143,144,273,145,38,15],"class_list":["post-2283","post","type-post","status-publish","format-standard","hentry","category-cryptographic-terminology","category-cryptography","category-general","category-security","category-series","tag-asymmetric-key","tag-asymmetric-key-encryption","tag-cryptography","tag-public-key-encryption","tag-security-2","tag-sql-server"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Asymmetric Key Encryption - sqlity.net<\/title>\n<meta name=\"description\" content=\"Asymmetric key encryption (aka public-key encryption) works with two separate keys, a public key to encrypt and a private key to decrypt.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sqlity.net\/en\/2283\/asymmetric-key\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Asymmetric Key Encryption - sqlity.net\" \/>\n<meta property=\"og:description\" content=\"Asymmetric key encryption (aka public-key encryption) works with two separate keys, a public key to encrypt and a private key to decrypt.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sqlity.net\/en\/2283\/asymmetric-key\/\" \/>\n<meta property=\"og:site_name\" content=\"sqlity.net\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sqlity.net\" \/>\n<meta property=\"article:published_time\" content=\"2014-03-24T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-11-13T18:10:06+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/sqlity.net\/wp-content\/uploads\/2014\/03\/asymmetric_key_encryption.jpg\" \/>\n<meta name=\"author\" content=\"Sebastian Meine\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sqlity\" \/>\n<meta name=\"twitter:site\" content=\"@sqlity\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sebastian Meine\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2283\\\/asymmetric-key\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2283\\\/asymmetric-key\\\/\"},\"author\":{\"name\":\"Sebastian Meine\",\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/#\\\/schema\\\/person\\\/bcffd8c572bc2f1bd10fdba80135e53c\"},\"headline\":\"Asymmetric Key Encryption\",\"datePublished\":\"2014-03-24T15:00:00+00:00\",\"dateModified\":\"2014-11-13T18:10:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2283\\\/asymmetric-key\\\/\"},\"wordCount\":496,\"commentCount\":1,\"image\":{\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2283\\\/asymmetric-key\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/sqlity.net\\\/wp-content\\\/uploads\\\/2014\\\/03\\\/asymmetric_key_encryption.jpg\",\"keywords\":[\"asymmetric key\",\"asymmetric key encryption\",\"Cryptography\",\"public-key encryption\",\"security\",\"SQL Server\"],\"articleSection\":[\"Cryptographic Terminology\",\"Cryptography\",\"General\",\"Security\",\"Series\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sqlity.net\\\/en\\\/2283\\\/asymmetric-key\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2283\\\/asymmetric-key\\\/\",\"url\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2283\\\/asymmetric-key\\\/\",\"name\":\"Asymmetric Key Encryption - sqlity.net\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2283\\\/asymmetric-key\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2283\\\/asymmetric-key\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/sqlity.net\\\/wp-content\\\/uploads\\\/2014\\\/03\\\/asymmetric_key_encryption.jpg\",\"datePublished\":\"2014-03-24T15:00:00+00:00\",\"dateModified\":\"2014-11-13T18:10:06+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/#\\\/schema\\\/person\\\/bcffd8c572bc2f1bd10fdba80135e53c\"},\"description\":\"Asymmetric key encryption (aka public-key encryption) works with two separate keys, a public key to encrypt and a private key to decrypt.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2283\\\/asymmetric-key\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sqlity.net\\\/en\\\/2283\\\/asymmetric-key\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2283\\\/asymmetric-key\\\/#primaryimage\",\"url\":\"http:\\\/\\\/sqlity.net\\\/wp-content\\\/uploads\\\/2014\\\/03\\\/asymmetric_key_encryption.jpg\",\"contentUrl\":\"http:\\\/\\\/sqlity.net\\\/wp-content\\\/uploads\\\/2014\\\/03\\\/asymmetric_key_encryption.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/2283\\\/asymmetric-key\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sqlity.net\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Asymmetric Key Encryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/sqlity.net\\\/en\\\/\",\"name\":\"sqlity.net\",\"description\":\"Quality for SQL\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sqlity.net\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sqlity.net\\\/en\\\/#\\\/schema\\\/person\\\/bcffd8c572bc2f1bd10fdba80135e53c\",\"name\":\"Sebastian Meine\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4ab0a6d02dd494849a584a2c3c8bc3bdcef1d0aa5f87e98bf905dbdb9ad2ce3a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4ab0a6d02dd494849a584a2c3c8bc3bdcef1d0aa5f87e98bf905dbdb9ad2ce3a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4ab0a6d02dd494849a584a2c3c8bc3bdcef1d0aa5f87e98bf905dbdb9ad2ce3a?s=96&d=mm&r=g\",\"caption\":\"Sebastian Meine\"},\"sameAs\":[\"http:\\\/\\\/sqlity.net\",\"https:\\\/\\\/x.com\\\/sqlity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Asymmetric Key Encryption - sqlity.net","description":"Asymmetric key encryption (aka public-key encryption) works with two separate keys, a public key to encrypt and a private key to decrypt.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sqlity.net\/en\/2283\/asymmetric-key\/","og_locale":"en_US","og_type":"article","og_title":"Asymmetric Key Encryption - sqlity.net","og_description":"Asymmetric key encryption (aka public-key encryption) works with two separate keys, a public key to encrypt and a private key to decrypt.","og_url":"https:\/\/sqlity.net\/en\/2283\/asymmetric-key\/","og_site_name":"sqlity.net","article_publisher":"https:\/\/www.facebook.com\/sqlity.net","article_published_time":"2014-03-24T15:00:00+00:00","article_modified_time":"2014-11-13T18:10:06+00:00","og_image":[{"url":"http:\/\/sqlity.net\/wp-content\/uploads\/2014\/03\/asymmetric_key_encryption.jpg","type":"","width":"","height":""}],"author":"Sebastian Meine","twitter_card":"summary_large_image","twitter_creator":"@sqlity","twitter_site":"@sqlity","twitter_misc":{"Written by":"Sebastian Meine","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sqlity.net\/en\/2283\/asymmetric-key\/#article","isPartOf":{"@id":"https:\/\/sqlity.net\/en\/2283\/asymmetric-key\/"},"author":{"name":"Sebastian Meine","@id":"https:\/\/sqlity.net\/en\/#\/schema\/person\/bcffd8c572bc2f1bd10fdba80135e53c"},"headline":"Asymmetric Key Encryption","datePublished":"2014-03-24T15:00:00+00:00","dateModified":"2014-11-13T18:10:06+00:00","mainEntityOfPage":{"@id":"https:\/\/sqlity.net\/en\/2283\/asymmetric-key\/"},"wordCount":496,"commentCount":1,"image":{"@id":"https:\/\/sqlity.net\/en\/2283\/asymmetric-key\/#primaryimage"},"thumbnailUrl":"http:\/\/sqlity.net\/wp-content\/uploads\/2014\/03\/asymmetric_key_encryption.jpg","keywords":["asymmetric key","asymmetric key encryption","Cryptography","public-key encryption","security","SQL Server"],"articleSection":["Cryptographic Terminology","Cryptography","General","Security","Series"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sqlity.net\/en\/2283\/asymmetric-key\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sqlity.net\/en\/2283\/asymmetric-key\/","url":"https:\/\/sqlity.net\/en\/2283\/asymmetric-key\/","name":"Asymmetric Key Encryption - sqlity.net","isPartOf":{"@id":"https:\/\/sqlity.net\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sqlity.net\/en\/2283\/asymmetric-key\/#primaryimage"},"image":{"@id":"https:\/\/sqlity.net\/en\/2283\/asymmetric-key\/#primaryimage"},"thumbnailUrl":"http:\/\/sqlity.net\/wp-content\/uploads\/2014\/03\/asymmetric_key_encryption.jpg","datePublished":"2014-03-24T15:00:00+00:00","dateModified":"2014-11-13T18:10:06+00:00","author":{"@id":"https:\/\/sqlity.net\/en\/#\/schema\/person\/bcffd8c572bc2f1bd10fdba80135e53c"},"description":"Asymmetric key encryption (aka public-key encryption) works with two separate keys, a public key to encrypt and a private key to decrypt.","breadcrumb":{"@id":"https:\/\/sqlity.net\/en\/2283\/asymmetric-key\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sqlity.net\/en\/2283\/asymmetric-key\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sqlity.net\/en\/2283\/asymmetric-key\/#primaryimage","url":"http:\/\/sqlity.net\/wp-content\/uploads\/2014\/03\/asymmetric_key_encryption.jpg","contentUrl":"http:\/\/sqlity.net\/wp-content\/uploads\/2014\/03\/asymmetric_key_encryption.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sqlity.net\/en\/2283\/asymmetric-key\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sqlity.net\/en\/"},{"@type":"ListItem","position":2,"name":"Asymmetric Key Encryption"}]},{"@type":"WebSite","@id":"https:\/\/sqlity.net\/en\/#website","url":"https:\/\/sqlity.net\/en\/","name":"sqlity.net","description":"Quality for SQL","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sqlity.net\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sqlity.net\/en\/#\/schema\/person\/bcffd8c572bc2f1bd10fdba80135e53c","name":"Sebastian Meine","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4ab0a6d02dd494849a584a2c3c8bc3bdcef1d0aa5f87e98bf905dbdb9ad2ce3a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4ab0a6d02dd494849a584a2c3c8bc3bdcef1d0aa5f87e98bf905dbdb9ad2ce3a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4ab0a6d02dd494849a584a2c3c8bc3bdcef1d0aa5f87e98bf905dbdb9ad2ce3a?s=96&d=mm&r=g","caption":"Sebastian Meine"},"sameAs":["http:\/\/sqlity.net","https:\/\/x.com\/sqlity"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2wXuw-AP","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/posts\/2283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/comments?post=2283"}],"version-history":[{"count":0,"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/posts\/2283\/revisions"}],"wp:attachment":[{"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/media?parent=2283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/categories?post=2283"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sqlity.net\/en\/wp-json\/wp\/v2\/tags?post=2283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}