Asymmetric Public-Key Encryption

First developed in the mid-1970s, 'Asymmetric' or 'Public-Key' encryption overcame the Key Distribution Problem through the use of keys that could be shared freely (hence 'public key').

Each user has a 'Key Pair', two mathematically-related keys. Their 'public' key is widely shared with others who can use it to encrypt a message. The message can only be decrypted with the 'private' key (which is never shared).

Sender (Alice)

Private Key

Public Key

Bob's Public Key

Plaintext for Bob

Cyphertext for Bob

Recipient (Bob)

Private Key

Public Key

Alice's Public Key

Cyphertext from Alice

Plaintext from Alice

Eavesdropper (Eve)

Alice's Public Key

Bob's Public Key

Cyphertext from Alice

Plaintext from Alice