SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Downloaden Sie, um offline zu lesen
PUBLIC VS. PRIVATE KEYS
101blockchains.com
What Is a
Public Key?
In asymmetric cryptography, the
public key is used to encrypt the
data. As it can be openly
distributed, it’s called a public
key.
Once a public key encrypts the
data, no one can use the public
key to decrypt the data. Typically,
the key size may vary from 128
bits to 4096 bits. There are
various algorithms used to create
the public key.
Application of Public Key Encryption
Verify Digital Signatures
Secure P2P Communications
Allow Password-Authenticated
Key Agreement
Verify Digital
Signatures
For digitally signing a message or
a contract, using public-key
encryption is the best choice.
Public key encryption allows the
user to use their private key to
sign the message.
The receiver can then use the
sender’s public key to verify the
signature of the sender.
Secure P2P
Communications
Public key cryptography is
necessary to maintain a secure
channel of communication
between two parties.
Here, the sender can use the
receiver’s public key to encrypt a
message. The receiver will then
use his/her private key to decrypt
the message.
Allow Password-
Authenticated Key
Agreement
Password-Authenticated Key
Agreement allows parties to
generate cryptographic keys
based on one of the party’s or
multiple party’s passwords.
Here, if the sender can use the
receiver’s password to generate a
private key and use that to
encrypt the message, the receiver
can use their own password to
see it.
What Is a
Private Key?
In asymmetric cryptography, the
private key is used to decrypt the
data. As it can’t be openly
distributed but needs to be kept
a secret, that’s why it’s called a
private key.
In symmetric cryptography, the
private key can encrypt and
decrypt data. It’s not possible to
recreate a private key from the
corresponding public key.
Crucial Points of Private Key
Generating the Key Pair
Storing the Private Key
Exchanging the Private Key
Key Management
Generating the
Key Pair
For this process, randomness is
necessary. Here, users utilize
encryption software to generate
these key pairs.
The software application will use
any form of randomness to
generate the keys.
Storing the
Private Key
After generating the private key,
users have to store these securely.
Users can store it offline or on a
device that was used to encrypt,
decrypt, and generate the key
pairs.
Using additional security like
passwords or encrypting the
private key can help in keeping it
a secret.
Exchanging the
Private Key
Users should never share their
private key with anyone.
In asymmetric cryptography, the
private key needs to be a secret. If
any other party gets access to the
key they can steal your tokens
and files.
Key
Management
There are some key pairs that
come with an expiration date.
Therefore, it’s crucial to have key
management in order to
maintain access.
You can’t use expired keys to
authenticate anything. Therefore,
it’s best practice to create a new
key pair before the expiration
date.
Private Key
Working Mechanism
Performance
Visibility
Type
Sharing
In symmetric cryptography – can
encrypt and decrypt; In asymmetric
cryptography – can only decrypt
Faster
Needs to be kept secret
The private key encryption and
decryption process is called symmetric
cryptography.
In asymmetric cryptography – can’t be
shared


It can only encrypt the data
Slower
Can be made public and free to
use
The public key encryption and
decryption process is called
asymmetric cryptography
Users can share the public key with anyone
Public vs. Private Keys: Differences
Public Key
Storing
Can be stored in private servers and
authorized devices
Can be stored anywhere
Working
Mechanism
A private key can be used in both
encryption and decryption based
on the type of cryptography. In
symmetric cryptography, the
private key can encrypt and
decrypt. In asymmetric
cryptography, the private key can
only decrypt.
On the other hand, the public key
can encrypt the data in
asymmetric cryptography. To
decrypt the data, one needs to use
a private key.
Type The private key encryption and
decryption process is called
symmetric cryptography. Here, a
single key is used within two
parties.
On the other hand, the public key
encryption and decryption process
is called asymmetric cryptography,
as there are two keys with different
objectives.
Performance
The private key encryption is a fast
process. As there is only one single
key usage in the encryption and
decryption process, it takes less
time to process it.
On the other hand, public-key
encryption is a slow process. It
requires a key pair to encrypt and
decrypt the data, and the process
is a bit complex, which takes more
time. Although, public-key
encryption is more secured.
Visibility
In asymmetric cryptography, the
private key is kept secret, and only
the owner will have access to it.
On the other hand, in asymmetric
cryptography, the public key is visible
to anyone, and anyone can use that
key to encrypt data.
Sharing
In asymmetric cryptography, the
private key can’t be shared with
any other party.
One can share the “public key” with
any party. There are no restrictions
here.
Storing For storing purposes, users need to
store their private keys safely. They
can store it on authorized devices
or store it on any private server with
high security in place.
Storing public keys within outgoing
emails, digital certificates, etc., are
common practice. It can be stored
anywhere the owner wants.
Learn More About Public
and Private Key
Blockchain Like a Boss
https://academy.101blockchains.com/c
ourses/blockchain-masterclass
101 Blockchains Certifications
Certified Enterprise
Blockchain Professional
Certified Enterprise
Blockchain Architect
Certified Blockchain
Security Expert
https://academy.101blockchains.com/cour
ses/certified-enterprise-blockchain-
architect
https://academy.101blockchains.com/cours
es/certified-blockchain-security-expert
https://academy.101blockchains.com/
courses/blockchain-expert-
certification
Why You Must Go With 101 Blockchains
Certification Courses?
High-Quality Research Information
First-class Training Content


Interactive Exercises
Flexible Learning Using Modular
Approach
Access to Bonus Training Materials
Various Training Strategies for Faster
Learning
Tangible Proof of Course Completion
Weekly Hands-on Assignments
Professional Instructors
Premium Support
Free Resources
Enterprise Blockchains Fundamentals - Free Course
Blockchain Webinars
Blockchain Conferences
Access Free Resources Now!
Blockchain Glossary
Blockchain Flash Cards
Blockchain Presentations
Blockchain Infographics
Trusted By 30,000+ Professionals!
Read real stories on Trustpilot and G2Crowd.
500+ reviews
The presentation is not intended to provide any investment advice and should not be
taken as such. Claims made in this presentation do not constitute investment advice
and should not be taken as such. Do your own research!
While the information contained in this document and presentation has been
obtained from sources believed to be reliable, 101 Blockchains disclaims all
warranties as to the completeness or accuracy.
Although 101 Blockchains research and training may address business, financial,
investment and legal issues, 101 Blockchains does not provide any business, financial,
legal or investment advice and this training should not be construed or used as such.
101 Blockchains shall not be responsible for any loss sustained by any person who
relies on this presentation.
Disclaimer
Thank You
© 2021 101 Blockchains. All rights reserved. This document may not be distributed, transmitted or reproduced in any form or by any means without
101 Blockchains’ prior written permission. While the information contained in this document has been obtained from sources believed to be reliable,
101 Blockchains disclaims all warranties as to the completeness or accuracy. Although 101 Blockchains research may address business, financial,
investment and legal issues, 101 Blockchains does not provide any business, financial, legal or investment advice and this document should not be
construed or used as such. 101 Blockchains shall not be responsible for any loss sustained by any person who relies on this publication.

Weitere ähnliche Inhalte

Was ist angesagt?

X.509 Certificates
X.509 CertificatesX.509 Certificates
X.509 CertificatesSou Jana
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption StandardPrince Rachit
 
block ciphers
block ciphersblock ciphers
block ciphersAsad Ali
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography pptThushara92
 
Digital Signature
Digital SignatureDigital Signature
Digital Signaturesaurav5884
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key CryptographyGopal Sakarkar
 
Cryptocurrency - Digital Currency
Cryptocurrency - Digital CurrencyCryptocurrency - Digital Currency
Cryptocurrency - Digital CurrencySameer Satyam
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key CryptosystemDevakumar Kp
 
Bitcoin (Cryptocurrency)
Bitcoin (Cryptocurrency)Bitcoin (Cryptocurrency)
Bitcoin (Cryptocurrency)Tsasaa Tsas
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free downloadTwinkal Harsora
 
Digital signature
Digital signatureDigital signature
Digital signaturePraseela R
 

Was ist angesagt? (20)

Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Aes
AesAes
Aes
 
X.509 Certificates
X.509 CertificatesX.509 Certificates
X.509 Certificates
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Network security cryptography ppt
Network security cryptography pptNetwork security cryptography ppt
Network security cryptography ppt
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Cryptocurrency - Digital Currency
Cryptocurrency - Digital CurrencyCryptocurrency - Digital Currency
Cryptocurrency - Digital Currency
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Bitcoin (Cryptocurrency)
Bitcoin (Cryptocurrency)Bitcoin (Cryptocurrency)
Bitcoin (Cryptocurrency)
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Elgamal digital signature
Elgamal digital signatureElgamal digital signature
Elgamal digital signature
 
Email security
Email securityEmail security
Email security
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature
Digital signatureDigital signature
Digital signature
 

Ähnlich wie Public Vs. Private Keys

hashicorp-virtualdays-vaultkeeping-a-secret-200409143039.pptx
hashicorp-virtualdays-vaultkeeping-a-secret-200409143039.pptxhashicorp-virtualdays-vaultkeeping-a-secret-200409143039.pptx
hashicorp-virtualdays-vaultkeeping-a-secret-200409143039.pptxhamzaaqqa7
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Anas Rock
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
PBU-Intro_to_PGP
PBU-Intro_to_PGPPBU-Intro_to_PGP
PBU-Intro_to_PGPauremoser
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy ExamLisa Olive
 
50+ Frequently Asked Cryptography Interview Questions in 2022
50+ Frequently Asked Cryptography Interview Questions in 202250+ Frequently Asked Cryptography Interview Questions in 2022
50+ Frequently Asked Cryptography Interview Questions in 2022Temok IT Services
 
Domain 9 of CEH Cryptography.pptx
Domain 9 of CEH Cryptography.pptxDomain 9 of CEH Cryptography.pptx
Domain 9 of CEH Cryptography.pptxInfosectrain3
 
Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Mumbai Academisc
 
Things You Must Know About Cryptocurrency Wallet Development
Things You Must Know About Cryptocurrency Wallet DevelopmentThings You Must Know About Cryptocurrency Wallet Development
Things You Must Know About Cryptocurrency Wallet DevelopmentRichestsoft
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSCAdv Prashant Mali
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesCheapSSLsecurity
 
Crypto Wallet Types Explained
Crypto Wallet Types ExplainedCrypto Wallet Types Explained
Crypto Wallet Types Explained101 Blockchains
 
Cyber public key cryptography
Cyber public key cryptographyCyber public key cryptography
Cyber public key cryptographyGopika Babu
 
Mediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloudMediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloudeSAT Journals
 
Authentication and session v4
Authentication and session v4Authentication and session v4
Authentication and session v4skimil
 

Ähnlich wie Public Vs. Private Keys (20)

Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
Cryptointro
CryptointroCryptointro
Cryptointro
 
hashicorp-virtualdays-vaultkeeping-a-secret-200409143039.pptx
hashicorp-virtualdays-vaultkeeping-a-secret-200409143039.pptxhashicorp-virtualdays-vaultkeeping-a-secret-200409143039.pptx
hashicorp-virtualdays-vaultkeeping-a-secret-200409143039.pptx
 
Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )Information Security Cryptography ( L01- introduction )
Information Security Cryptography ( L01- introduction )
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
PBU-Intro_to_PGP
PBU-Intro_to_PGPPBU-Intro_to_PGP
PBU-Intro_to_PGP
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
50+ Frequently Asked Cryptography Interview Questions in 2022
50+ Frequently Asked Cryptography Interview Questions in 202250+ Frequently Asked Cryptography Interview Questions in 2022
50+ Frequently Asked Cryptography Interview Questions in 2022
 
Domain 9 of CEH Cryptography.pptx
Domain 9 of CEH Cryptography.pptxDomain 9 of CEH Cryptography.pptx
Domain 9 of CEH Cryptography.pptx
 
Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)Demonstration of secure socket layer(synopsis)
Demonstration of secure socket layer(synopsis)
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
 
Things You Must Know About Cryptocurrency Wallet Development
Things You Must Know About Cryptocurrency Wallet DevelopmentThings You Must Know About Cryptocurrency Wallet Development
Things You Must Know About Cryptocurrency Wallet Development
 
Computer Introduction-Lecture05
Computer Introduction-Lecture05Computer Introduction-Lecture05
Computer Introduction-Lecture05
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
What is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple ExamplesWhat is Asymmetric Encryption? Understand with Simple Examples
What is Asymmetric Encryption? Understand with Simple Examples
 
Crypto Wallet Types Explained
Crypto Wallet Types ExplainedCrypto Wallet Types Explained
Crypto Wallet Types Explained
 
Cyber public key cryptography
Cyber public key cryptographyCyber public key cryptography
Cyber public key cryptography
 
Mediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloudMediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloud
 
Authentication and session v4
Authentication and session v4Authentication and session v4
Authentication and session v4
 

Mehr von 101 Blockchains

FinTech Guide for Beginner's
FinTech Guide for Beginner'sFinTech Guide for Beginner's
FinTech Guide for Beginner's101 Blockchains
 
Web 3.0 - A Detailed Guide
Web 3.0 - A Detailed GuideWeb 3.0 - A Detailed Guide
Web 3.0 - A Detailed Guide101 Blockchains
 
Frequently Asked Questions About Metaverse
Frequently Asked Questions About MetaverseFrequently Asked Questions About Metaverse
Frequently Asked Questions About Metaverse101 Blockchains
 
NFTs and Their Role in The Metaverse
NFTs and Their Role in The MetaverseNFTs and Their Role in The Metaverse
NFTs and Their Role in The Metaverse101 Blockchains
 
Is Metaverse The Next Big Thing?
Is Metaverse The Next Big Thing?Is Metaverse The Next Big Thing?
Is Metaverse The Next Big Thing?101 Blockchains
 
5 Best Metaverse Games to Play
5 Best Metaverse Games to Play5 Best Metaverse Games to Play
5 Best Metaverse Games to Play101 Blockchains
 
Top 5 Metaverse Tokens To Watch
Top 5 Metaverse Tokens To WatchTop 5 Metaverse Tokens To Watch
Top 5 Metaverse Tokens To Watch101 Blockchains
 
An Introduction To Metaverse
An Introduction To MetaverseAn Introduction To Metaverse
An Introduction To Metaverse101 Blockchains
 
Disadvantages of Blockchain
Disadvantages of BlockchainDisadvantages of Blockchain
Disadvantages of Blockchain101 Blockchains
 
Introduction To Solidity
Introduction To SolidityIntroduction To Solidity
Introduction To Solidity101 Blockchains
 
Examples of Smart Contracts
Examples of Smart ContractsExamples of Smart Contracts
Examples of Smart Contracts101 Blockchains
 
PoW vs. PoS - Key Differences
PoW vs. PoS - Key DifferencesPoW vs. PoS - Key Differences
PoW vs. PoS - Key Differences101 Blockchains
 
An Ultimate Guide to NFT Applications
An Ultimate Guide to NFT ApplicationsAn Ultimate Guide to NFT Applications
An Ultimate Guide to NFT Applications101 Blockchains
 
Know Everything About Business Model Innovation
Know Everything About Business Model InnovationKnow Everything About Business Model Innovation
Know Everything About Business Model Innovation101 Blockchains
 
How to Kickstart Career in DeFi?
How to Kickstart Career in DeFi?How to Kickstart Career in DeFi?
How to Kickstart Career in DeFi?101 Blockchains
 
How To Start A Career In The NFT Space?
How To Start A Career In The NFT Space?How To Start A Career In The NFT Space?
How To Start A Career In The NFT Space?101 Blockchains
 
What Is Bitcoin And How Does It Work?
What Is Bitcoin And How Does It Work?What Is Bitcoin And How Does It Work?
What Is Bitcoin And How Does It Work?101 Blockchains
 

Mehr von 101 Blockchains (20)

Web3 Fundamentals
Web3 FundamentalsWeb3 Fundamentals
Web3 Fundamentals
 
FinTech Guide for Beginner's
FinTech Guide for Beginner'sFinTech Guide for Beginner's
FinTech Guide for Beginner's
 
Web 3.0 - A Detailed Guide
Web 3.0 - A Detailed GuideWeb 3.0 - A Detailed Guide
Web 3.0 - A Detailed Guide
 
Frequently Asked Questions About Metaverse
Frequently Asked Questions About MetaverseFrequently Asked Questions About Metaverse
Frequently Asked Questions About Metaverse
 
NFTs and Their Role in The Metaverse
NFTs and Their Role in The MetaverseNFTs and Their Role in The Metaverse
NFTs and Their Role in The Metaverse
 
Is Metaverse The Next Big Thing?
Is Metaverse The Next Big Thing?Is Metaverse The Next Big Thing?
Is Metaverse The Next Big Thing?
 
5 Best Metaverse Games to Play
5 Best Metaverse Games to Play5 Best Metaverse Games to Play
5 Best Metaverse Games to Play
 
Top 5 Metaverse Tokens To Watch
Top 5 Metaverse Tokens To WatchTop 5 Metaverse Tokens To Watch
Top 5 Metaverse Tokens To Watch
 
An Introduction To Metaverse
An Introduction To MetaverseAn Introduction To Metaverse
An Introduction To Metaverse
 
Disadvantages of Blockchain
Disadvantages of BlockchainDisadvantages of Blockchain
Disadvantages of Blockchain
 
Introduction To Solidity
Introduction To SolidityIntroduction To Solidity
Introduction To Solidity
 
Examples of Smart Contracts
Examples of Smart ContractsExamples of Smart Contracts
Examples of Smart Contracts
 
Top 5 DeFi Applications
Top 5 DeFi ApplicationsTop 5 DeFi Applications
Top 5 DeFi Applications
 
PoW vs. PoS - Key Differences
PoW vs. PoS - Key DifferencesPoW vs. PoS - Key Differences
PoW vs. PoS - Key Differences
 
How NFT Works
How NFT WorksHow NFT Works
How NFT Works
 
An Ultimate Guide to NFT Applications
An Ultimate Guide to NFT ApplicationsAn Ultimate Guide to NFT Applications
An Ultimate Guide to NFT Applications
 
Know Everything About Business Model Innovation
Know Everything About Business Model InnovationKnow Everything About Business Model Innovation
Know Everything About Business Model Innovation
 
How to Kickstart Career in DeFi?
How to Kickstart Career in DeFi?How to Kickstart Career in DeFi?
How to Kickstart Career in DeFi?
 
How To Start A Career In The NFT Space?
How To Start A Career In The NFT Space?How To Start A Career In The NFT Space?
How To Start A Career In The NFT Space?
 
What Is Bitcoin And How Does It Work?
What Is Bitcoin And How Does It Work?What Is Bitcoin And How Does It Work?
What Is Bitcoin And How Does It Work?
 

Kürzlich hochgeladen

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Kürzlich hochgeladen (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Public Vs. Private Keys

  • 1. PUBLIC VS. PRIVATE KEYS 101blockchains.com
  • 2. What Is a Public Key? In asymmetric cryptography, the public key is used to encrypt the data. As it can be openly distributed, it’s called a public key. Once a public key encrypts the data, no one can use the public key to decrypt the data. Typically, the key size may vary from 128 bits to 4096 bits. There are various algorithms used to create the public key.
  • 3. Application of Public Key Encryption Verify Digital Signatures Secure P2P Communications Allow Password-Authenticated Key Agreement
  • 4. Verify Digital Signatures For digitally signing a message or a contract, using public-key encryption is the best choice. Public key encryption allows the user to use their private key to sign the message. The receiver can then use the sender’s public key to verify the signature of the sender.
  • 5. Secure P2P Communications Public key cryptography is necessary to maintain a secure channel of communication between two parties. Here, the sender can use the receiver’s public key to encrypt a message. The receiver will then use his/her private key to decrypt the message.
  • 6. Allow Password- Authenticated Key Agreement Password-Authenticated Key Agreement allows parties to generate cryptographic keys based on one of the party’s or multiple party’s passwords. Here, if the sender can use the receiver’s password to generate a private key and use that to encrypt the message, the receiver can use their own password to see it.
  • 7. What Is a Private Key? In asymmetric cryptography, the private key is used to decrypt the data. As it can’t be openly distributed but needs to be kept a secret, that’s why it’s called a private key. In symmetric cryptography, the private key can encrypt and decrypt data. It’s not possible to recreate a private key from the corresponding public key.
  • 8. Crucial Points of Private Key Generating the Key Pair Storing the Private Key Exchanging the Private Key Key Management
  • 9. Generating the Key Pair For this process, randomness is necessary. Here, users utilize encryption software to generate these key pairs. The software application will use any form of randomness to generate the keys.
  • 10. Storing the Private Key After generating the private key, users have to store these securely. Users can store it offline or on a device that was used to encrypt, decrypt, and generate the key pairs. Using additional security like passwords or encrypting the private key can help in keeping it a secret.
  • 11. Exchanging the Private Key Users should never share their private key with anyone. In asymmetric cryptography, the private key needs to be a secret. If any other party gets access to the key they can steal your tokens and files.
  • 12. Key Management There are some key pairs that come with an expiration date. Therefore, it’s crucial to have key management in order to maintain access. You can’t use expired keys to authenticate anything. Therefore, it’s best practice to create a new key pair before the expiration date.
  • 13. Private Key Working Mechanism Performance Visibility Type Sharing In symmetric cryptography – can encrypt and decrypt; In asymmetric cryptography – can only decrypt Faster Needs to be kept secret The private key encryption and decryption process is called symmetric cryptography. In asymmetric cryptography – can’t be shared It can only encrypt the data Slower Can be made public and free to use The public key encryption and decryption process is called asymmetric cryptography Users can share the public key with anyone Public vs. Private Keys: Differences Public Key Storing Can be stored in private servers and authorized devices Can be stored anywhere
  • 14. Working Mechanism A private key can be used in both encryption and decryption based on the type of cryptography. In symmetric cryptography, the private key can encrypt and decrypt. In asymmetric cryptography, the private key can only decrypt. On the other hand, the public key can encrypt the data in asymmetric cryptography. To decrypt the data, one needs to use a private key.
  • 15. Type The private key encryption and decryption process is called symmetric cryptography. Here, a single key is used within two parties. On the other hand, the public key encryption and decryption process is called asymmetric cryptography, as there are two keys with different objectives.
  • 16. Performance The private key encryption is a fast process. As there is only one single key usage in the encryption and decryption process, it takes less time to process it. On the other hand, public-key encryption is a slow process. It requires a key pair to encrypt and decrypt the data, and the process is a bit complex, which takes more time. Although, public-key encryption is more secured.
  • 17. Visibility In asymmetric cryptography, the private key is kept secret, and only the owner will have access to it. On the other hand, in asymmetric cryptography, the public key is visible to anyone, and anyone can use that key to encrypt data.
  • 18. Sharing In asymmetric cryptography, the private key can’t be shared with any other party. One can share the “public key” with any party. There are no restrictions here.
  • 19. Storing For storing purposes, users need to store their private keys safely. They can store it on authorized devices or store it on any private server with high security in place. Storing public keys within outgoing emails, digital certificates, etc., are common practice. It can be stored anywhere the owner wants.
  • 20. Learn More About Public and Private Key Blockchain Like a Boss https://academy.101blockchains.com/c ourses/blockchain-masterclass
  • 21. 101 Blockchains Certifications Certified Enterprise Blockchain Professional Certified Enterprise Blockchain Architect Certified Blockchain Security Expert https://academy.101blockchains.com/cour ses/certified-enterprise-blockchain- architect https://academy.101blockchains.com/cours es/certified-blockchain-security-expert https://academy.101blockchains.com/ courses/blockchain-expert- certification
  • 22. Why You Must Go With 101 Blockchains Certification Courses? High-Quality Research Information First-class Training Content Interactive Exercises Flexible Learning Using Modular Approach Access to Bonus Training Materials Various Training Strategies for Faster Learning Tangible Proof of Course Completion Weekly Hands-on Assignments Professional Instructors Premium Support
  • 23. Free Resources Enterprise Blockchains Fundamentals - Free Course Blockchain Webinars Blockchain Conferences Access Free Resources Now! Blockchain Glossary Blockchain Flash Cards Blockchain Presentations Blockchain Infographics
  • 24. Trusted By 30,000+ Professionals! Read real stories on Trustpilot and G2Crowd. 500+ reviews
  • 25. The presentation is not intended to provide any investment advice and should not be taken as such. Claims made in this presentation do not constitute investment advice and should not be taken as such. Do your own research! While the information contained in this document and presentation has been obtained from sources believed to be reliable, 101 Blockchains disclaims all warranties as to the completeness or accuracy. Although 101 Blockchains research and training may address business, financial, investment and legal issues, 101 Blockchains does not provide any business, financial, legal or investment advice and this training should not be construed or used as such. 101 Blockchains shall not be responsible for any loss sustained by any person who relies on this presentation. Disclaimer
  • 26. Thank You © 2021 101 Blockchains. All rights reserved. This document may not be distributed, transmitted or reproduced in any form or by any means without 101 Blockchains’ prior written permission. While the information contained in this document has been obtained from sources believed to be reliable, 101 Blockchains disclaims all warranties as to the completeness or accuracy. Although 101 Blockchains research may address business, financial, investment and legal issues, 101 Blockchains does not provide any business, financial, legal or investment advice and this document should not be construed or used as such. 101 Blockchains shall not be responsible for any loss sustained by any person who relies on this publication.