Asymmetric cryptography is very useful for a variety of systems. With asymmetric cryptography, you can:

How it works

Asymmetric cryptography works by generating and using key-pairs. Key-pairs consist of two keys:

Let's imagine Alice wants to digitally sign a message to Bob to prove it is really coming from her. Here is how it works:

  1. Alice generates a key-pair. She keeps the private key to herself and shares the public key with Bob and everyone else.
  2. Alice uses her private key to sign the message. This creates a signature that is unique to her private key and the message. Asymmetric cryptography signing
  3. Alice sends the signed message to Bob. Bob can use Alice's public key to verify that the message was really signed by Alice. If the signature is valid, Bob can be sure that the message was really signed by Alice.

Asymmetric cryptography verifying

Real use case examples

Further learning

This guide is a very high-level overview of asymmetric cryptography. If you want to learn more, here are some resources: