Asymmetric cryptography and digital signatures – Part 2

The first part of this blog series introduced the concept of symmetric cryptography, which can en-sure the confidentiality of data to be exchanged. Symmetric cryptography is based on the funda-mental assumption that the key used, which is to be kept secret, must be transmitted between the communication partners via a secure channel, since otherwise third parties with knowledge of the key can access the ciphertext. Accordingly, with the help of symmetric cryptography, the problem of secret message transmission is reduced to secret key transmission only. To get around this prob-lem, this second part of the blog series presents an introduction to the concept of asymmetric cryp-tography.

Continue reading »