Back to Course

3. Advanced Course

0% Complete
0/0 Steps
  1. 1. What is Taproot?
  2. 2. Blockchain bridges – what are they?
  3. 3. What is the 51% attack on blockchain?
  4. 4. Zero-knowledge proof – a protocol that respects privacy 
  5. 5. What is EOSREX?
  6. 6. Mirror Protocol – what it is? 
  7. 7. What is DAO, and how does it work?
  8. 8. What is spoofing in the cryptocurrency market? 
  9. 9. What is digital property rights in NFT?
  10. 10. How to verify a cryptocurrency project – cryptocurrency tokenomics 
  11. 11. What is Ethereum Plasma?
  12. 12. What is Ethereum Casper?
  13. 13. What is Selfish Mining? 
  14. 14. How to create your own NFT? 
  15. 15. Schnorr signatures - what are they? 
  16. 16. What is Zk-SNARK and Zk-STARK? 
  17. 17. What is Proof of Elapsed Time (PoET)?
  18. 18. MimbleWimble - what is it? 
  19. 19. What are ETFs and what role do they play in the cryptocurrency market? 
  20. 20. What are synthetic assets? 
  21. 21. Definition of DeFi, and what are its liquidations?
  22. 22. New identity system - Polygon ID
  23. 23. What is Ethereum Virtual Machine (EVM) and how does it work?
  24. 24. Ethereum Foundation and the Scroll protocol - what is it?
  25. 25. What is Byzantine fault tolerance in blockchain technology?
  26. 26. Scalability of blockchain technology - what is it?
  27. 27. Interchain Security - new Cosmos (ATOM) protocol
  28. 28. Coin Mixing vs. Coin Join - definition, opportunities, and threats
  29. 29. Soulbound Tokens - what are they, and how do they work?
  30. 30. Definition of LIDO - what is it?
  31. 38. What is Web3 Infura?
  32. 39. Mantle - Ethereum L2 scalability - how does it work?
  33. 40. Polygon zkEVM - everything you need to know
  34. 41. What is Optimism (OP), and how do its roll-ups work?
  35. 42. What are RPC nodes, and how do they work?
  36. 43. SEI Network: everything you need to know about the Tier 1 solution for DeFi
  37. 44. Types of Proof-of-Stake Consensus Mechanisms: DPoS, LPoS and BPoS
  38. 45. Bedrock: the epileptic curve that ensures security!
  39. 46. What is Tendermint, and how does it work?
  40. 47. Pantos: how to solve the problem of token transfer between blockchains?
  41. 48. What is asymmetric encryption?
  42. 49. Base-58 Function in Cryptocurrencies
  43. 50. What Is the Nostr Protocol and How Does It Work?
  44. 51. What Is the XDAI Bridge and How Does It Work?
  45. 52. Solidity vs. Rust: What Are the Differences Between These Programming Languages?
  46. 53. What is a Pinata in Web 3? We explain!
  47. 54. What Is a Real-Time Operating System (RTOS)?
  48. 55. What Is the Ethereum Rinkeby Testnet and How Does It Work?
  49. 56. What Is Probabilistic Encryption?
  50. 57. What Is EIP-4337? Will Ethereum Account Abstraction Change Web3 Forever?
  51. 58. What are smart contract audits? Which companies are involved?
  52. 59. How does the AirGapped wallet work?
  53. 60. What is proto-danksharding (EIP-4844) on Ethereum?
  54. 61. How to Recover Cryptocurrencies Sent to the Wrong Address or Network: A Practical Guide
  55. 62. MPC Wallet and Multilateral Computing: Innovative Technology for Privacy and Security
  56. 63. What is decentralised storage and how does it work?
  57. 64. Quant Network: scalability of the future
  58. 65. What is StarkWare, and recursive validity proofs
Lesson 41 of 58
In Progress

48. What is asymmetric encryption?

Asymmetric encryption is also known as asymmetric cryptography. It allows users to encrypt information with so-called shared keys.

An example: you want to send a message to your colleague, but you do not want anyone other than him to see it. This is precisely the purpose of asymmetric encryption.

Very importantly, asymmetric encryption technology is absolutely secure. Even more interesting is that we ourselves come into contact with this type of encryption every day without realizing it. What are we talking about? Do you know a website that starts with “HTTPS”? That’s right 🙂 Here, too, we are dealing with asymmetric encryption.

Asymmetric encryption – definition

The Internet has become an integral part of our lives. Every day we carry out sensitive transactions (e.g. banking transactions ) or chat with friends (e.g. via Messenger ). It is therefore not surprising that individuals or companies need robust security measures to ensure that their data is not compromised online. Asymmetric encryption was developed for this purpose. To help.

The essence of asymmetric encryption is based on two keys:

  1. Public key encryption, meaning that any recipient can see and access the data.
  2. Private key encryption: only authenticated recipients can access the data.

Very importantly, asymmetric encryption is based on these two keys. One encrypts and the other decrypts. The result? A high level of security.

A public key is a cryptographic key that can be used by any person to encrypt a particular message in such a way that it can only be decrypted by the recipient with his or her private key. The private key, also known as the secret key, is shared with the originator of the key.

So if we want to send a message using asymmetric cryptography, we can take the recipient’s public key from the public directory and use it to encrypt the message before we send it. The recipient will read the message as he decrypts it with the corresponding private key.

If, on the other hand, the sender of the message encrypts it with the private key, the message can be decrypted with the sender’s public key. The entire encryption and decryption process runs automatically. Users do not have to physically lock or unlock the message.

Many protocols are based on asymmetric cryptography. These include the TLS (Transport Layer Security) or SSl (Secure Sockets Layer) protocols that enable HTTPS.

The procedure of such encryption is also used in programs that need to establish a secure connection via an insecure (otherwise: unsecured) network, such as web browsers. Asymmetric cryptography is also used to validate digital signatures.

As already mentioned, the increased security is an advantage of asymmetric cryptography. It is the most secure and best- known encryption method. And why? Because users do not have to reveal their keys, let alone share them. This reduces the chances of cybercriminals intercepting a user’s private key during a transaction.

How does asymmetric cryptography work?

Quite simple! 🙂 Its entire mode of operation is based on the two keys mentioned. In asymmetric encryption, a mathematically related key pair is used for encryption and decryption. We talk about a private key and a public key. When we use the public key to encrypt, we decrypt the message with the private key. And of course, vice versa – if we use the private key to encrypt, only the corresponding public key can decrypt the message.

All asymmetric encryption is completed by the sender and the receiver. Everyone has their own key pair. How does this work in practice? The sender receives the public key from the recipient. Then he encrypts the message with the corresponding key. In this way, a so-called ciphertext is created. This is sent to the recipient, who decrypts the message with his private key. The transmitted message then has a readable, plain text.

The encryption function outlined above is one-way. This means that a sender cannot read another sender’s message even if he has the recipient’s public key.

Use cases

Most commonly, asymmetric cryptography is used to authenticate data using digital signatures.

Interesting fact: A digital signature is a mathematical technique for confirming the authenticity and integrity of a message, software or digital document. It is the digital equivalent of a handwritten signature or seal.

We also use asymmetric cryptography in areas such as:

  • Electronic mail. A public key can be used to encrypt a message and a private key to decrypt it.
  • SSL/TLS. That is, encrypted connections between websites and browsers. Yes, asymmetric encryption is also used here.
  • Cryptocurrencies. Users have their public keys, which everyone can see, and their private keys, which they keep secret. This ensures that only the rightful owners can spend the funds.

Advantages of asymmetric cryptography

First and foremost is security. It is increased because the private keys do not have to be disclosed.

Easy verification of the sender thanks to digital signatures. In addition, asymmetric cryptography enables non-repudiation, i.e. the sender cannot deny having sent the message in question.

Disadvantages of asymmetric cryptography

The method itself is slower than symmetric cryptography. Therefore, it is not used for decrypting mass messages.

The worst thing is that a person who loses his private key will not be able to decrypt the message. Speaking of keys, it is worth noting that public keys are not authenticated. So no one can assure us that the public key belongs to that particular person.

Some examples of asymmetric cryptography

  1. The most commonly used asymmetric algorithm is the RSA algorithm. It is embedded directly in SSl/TSL. The RSA algorithm derives its security from the difficulties involved in factoring large integers. These in turn are the product of two large prime numbers. RSA keys are usually 1024 or 2048 bits long.
  1. Elliptic Curve Cryptography (ECC). An alternative to RSA. This is a public key encryption technique based on elliptic curve theory. It can create faster, smaller or more efficient keys thanks to the properties of the elliptic curve. To crack the ECC algorithm, a cybercriminal must break the logarithm of the elliptic curve. This is definitely more difficult than factorization.


In asymmetric encryption, we need two types of keys – public and private – to decrypt the data sent to us. This increases the security of the messages being transmitted.

The idea of asymmetric encryption itself is not new. The concept was defined decades ago. In 1977, two researchers from Stanford University published a paper that dealt with this encryption technique. Over time, their idea spread and the result was this data protection solution.