If you recall asymmetric encryption, it employs two separate keys, distinct from symmetric encryption's single-key approach. This use of two keys holds significant implications for confidentiality, key distribution, and authentication, as we'll explore in the following sections.
To discern between symmetric and asymmetric encryption, we refer to the key used in symmetric encryption as a secret key. The two keys used for asymmetric encryption are referred to as the public key and the private key.
In public-key cryptosystems, there are three main categories of usage, each involving different aspects of key management:
Some algorithms are suitable for all three applications, whereas others can be used only for one or two of these applications. The table below indicates the applications supported by the algorithms discussed.
Table 2.1 Applications for public-key cryptosystems.
One in particular which will look further into is RSA.
The requirements for public-key cryptosystems can be simplified as follows: