Encryption or transforming the original data to a cryptic or

uninterpretable format.

Decryption or converting the encrypted data back to its original

form.

In each cryptographic algorithm, we use two different types of

cryptographic keys for the encryption and decryption of the data,

which are as follows:

Symmetric cryptography

Asymmetric cryptography

1.5.1.1 Symmetric Cryptography

In symmetric cryptography, there is only one cryptographic key that

is used for both encrypting as well as decrypting the data. This

approach is easier and yet has limited functionalities and use cases.

1.5.1.2 Asymmetric Cryptography

Public-key cryptography, also known as asymmetric cryptography,

uses a pair of keys, which are as follows:

Public key, that can be visible to others

Private key, that stays only with the owner

While one key can be used to lock the message, the other can

unlock it. These two keys can be used in a variety of different ways;

look at the following example:

Alice wishes to send a secret message to Bob. Alice would

encrypt the transaction with Bob’s public key and only Bob can

decrypt it using his own private key.

Alice signs a document using her private key, also known as

Digital Signature”. The others who know Alice’s public key

can validate that the document is actually signed by Alice.

The following are the different types of asymmetric cryptography:

1.5.1.2.1 RSA