Back to Course

3. Advanced Course

0% Complete
0/0 Steps
  1. 1. What is Taproot?
  2. 2. Blockchain bridges – what are they?
  3. 3. What is Ethereum Plasma?
  4. 4. What is Ethereum Casper?
  5. 5. What is Zk-SNARK and Zk-STARK? 
  6. 6. What is Selfish Mining? 
  7. 7. What is spoofing in the cryptocurrency market? 
  8. 8. Schnorr signatures - what are they? 
  9. 9. MimbleWimble - what is it? 
  10. 10. What is digital property rights in NFT?
  11. 11. What are ETFs and what role do they play in the cryptocurrency market? 
  12. 12. How to verify a cryptocurrency project – cryptocurrency tokenomics 
  13. 13. What is the 51% attack on blockchain?
  14. 14. What is DAO, and how does it work?
  15. 15. Zero-knowledge proof – a protocol that respects privacy 
  16. 16. What is EOSREX?
  17. 17. What is Proof of Elapsed Time (PoET)?
  18. 18. Mirror Protocol – what it is? 
  19. 19. What are synthetic assets? 
  20. 20. How to create your own NFT? 
  21. 21. Definition of DeFi, and what are its liquidations?
  22. 22. New identity system - Polygon ID
  23. 23. Ethereum Foundation and the Scroll protocol - what is it?
  24. 24. What is Byzantine fault tolerance in blockchain technology?
  25. 25. Scalability of blockchain technology - what is it?
  26. 26. Interchain Security - new Cosmos (ATOM) protocol
  27. 27. Coin Mixing vs. Coin Join - definition, opportunities, and threats
  28. 28. What is Ethereum Virtual Machine (EVM) and how does it work?
  29. 29. Soulbound Tokens - what are they, and how do they work?
  30. 30. Definition of LIDO - what is it?
  31. 31. What are Threshold Signatures, and how do they work?
  32. 32. Blockchain technology and cyberattacks.
  33. 33. Bitcoin script - what it is, and what you should know about it.
  34. 34. What is zkEVM, and what are its basic features?
  35. 35. Do confidential transactions on blockchain exist? What is a Confidential Transaction?
  36. 36. Algorithmic stablecoins - everything you should know about them.
  37. 37. Polygon Zk Rollups ZKP - what should you know about it?
  38. 38. What is Web3 Infura?
  39. 39. Mantle - Ethereum L2 scalability - how does it work?
  40. 40. What is the NEAR Rainbow Bridge?
  41. 41. Liquid Staking Ethereum and LSD tokens. What do you need to know about it?
  42. 42. Top 10 blockchain oracles. How do they work? How do they differ?
  43. 43. What are Web3.js and Ether.js? What are the main differences between them?
  44. 44. What is StarkWare, and recursive validity proofs
  45. 45. Quant Network: scalability of the future
  46. 46. Polygon zkEVM - everything you need to know
  47. 47. What is Optimism (OP), and how do its roll-ups work?
  48. 48. What are RPC nodes, and how do they work?
  49. 49. SEI Network: everything you need to know about the Tier 1 solution for DeFi
  50. 50. Types of Proof-of-Stake Consensus Mechanisms: DPoS, LPoS and BPoS
  51. 51. Bedrock: the epileptic curve that ensures security!
  52. 52. What is Tendermint, and how does it work?
  53. 53. Pantos: how to solve the problem of token transfer between blockchains?
  54. 54. What is asymmetric encryption?
  55. 55. Base-58 Function in Cryptocurrencies
  56. 56. What Is the Nostr Protocol and How Does It Work?
  57. 57. What Is the XDAI Bridge and How Does It Work?
  58. 58. Solidity vs. Rust: What Are the Differences Between These Programming Languages?
  59. 59. What Is a Real-Time Operating System (RTOS)?
  60. 60. What Is the Ethereum Rinkeby Testnet and How Does It Work?
  61. 61. What Is Probabilistic Encryption?
  62. 62. What is a Pinata in Web 3? We explain!
  63. 63. What Is EIP-4337? Will Ethereum Account Abstraction Change Web3 Forever?
  64. 64. What are smart contract audits? Which companies are involved?
  65. 65. How does the AirGapped wallet work?
  66. 66. What is proto-danksharding (EIP-4844) on Ethereum?
  67. 67. What is decentralised storage and how does it work?
  68. 68. How to Recover Cryptocurrencies Sent to the Wrong Address or Network: A Practical Guide
  69. 69. MPC Wallet and Multilateral Computing: Innovative Technology for Privacy and Security
  70. 70. Threshold signature in cryptography: an advanced signing technique!
  71. 71. Vanity address in cryptocurrencies: what is it and what are its characteristics?
  72. 72. Reentrancy Attack on smart contracts: a threat to blockchain security!
  73. 73. Slither: a static analyser for smart contracts!
  74. 74. Sandwich Attack at DeFi: explanation and risks!
  75. 75. Blockchain RPC for Web3: A key technology in the world of decentralized finance!
  76. 76. Re-staking: the benefits of re-posting in staking!
  77. 77. Base: Evolving cryptocurrency transactions with a tier-2 solution from Coinbase
  78. 78. IPFS: A new era of decentralized data storage
  79. 79. Typical vulnerabilities and bridge security in blockchain technology
  80. 80. JumpNet - Ethereum's new sidechain
Lesson 54 of 80
In Progress

54. What is asymmetric encryption?

Asymmetric encryption is also known as asymmetric cryptography. It allows users to encrypt information with so-called shared keys.

An example: you want to send a message to your colleague, but you do not want anyone other than him to see it. This is precisely the purpose of asymmetric encryption.

Very importantly, asymmetric encryption technology is absolutely secure. Even more interesting is that we ourselves come into contact with this type of encryption every day without realizing it. What are we talking about? Do you know a website that starts with “HTTPS”? That’s right 🙂 Here, too, we are dealing with asymmetric encryption.

Asymmetric encryption – definition

The Internet has become an integral part of our lives. Every day we carry out sensitive transactions (e.g. banking transactions ) or chat with friends (e.g. via Messenger ). It is therefore not surprising that individuals or companies need robust security measures to ensure that their data is not compromised online. Asymmetric encryption was developed for this purpose. To help.

The essence of asymmetric encryption is based on two keys:

  1. Public key encryption, meaning that any recipient can see and access the data.
  2. Private key encryption: only authenticated recipients can access the data.

Very importantly, asymmetric encryption is based on these two keys. One encrypts and the other decrypts. The result? A high level of security.

A public key is a cryptographic key that can be used by any person to encrypt a particular message in such a way that it can only be decrypted by the recipient with his or her private key. The private key, also known as the secret key, is shared with the originator of the key.

So if we want to send a message using asymmetric cryptography, we can take the recipient’s public key from the public directory and use it to encrypt the message before we send it. The recipient will read the message as he decrypts it with the corresponding private key.

If, on the other hand, the sender of the message encrypts it with the private key, the message can be decrypted with the sender’s public key. The entire encryption and decryption process runs automatically. Users do not have to physically lock or unlock the message.

Many protocols are based on asymmetric cryptography. These include the TLS (Transport Layer Security) or SSl (Secure Sockets Layer) protocols that enable HTTPS.

The procedure of such encryption is also used in programs that need to establish a secure connection via an insecure (otherwise: unsecured) network, such as web browsers. Asymmetric cryptography is also used to validate digital signatures.

As already mentioned, the increased security is an advantage of asymmetric cryptography. It is the most secure and best- known encryption method. And why? Because users do not have to reveal their keys, let alone share them. This reduces the chances of cybercriminals intercepting a user’s private key during a transaction.

How does asymmetric cryptography work?

Quite simple! 🙂 Its entire mode of operation is based on the two keys mentioned. In asymmetric encryption, a mathematically related key pair is used for encryption and decryption. We talk about a private key and a public key. When we use the public key to encrypt, we decrypt the message with the private key. And of course, vice versa – if we use the private key to encrypt, only the corresponding public key can decrypt the message.

All asymmetric encryption is completed by the sender and the receiver. Everyone has their own key pair. How does this work in practice? The sender receives the public key from the recipient. Then he encrypts the message with the corresponding key. In this way, a so-called ciphertext is created. This is sent to the recipient, who decrypts the message with his private key. The transmitted message then has a readable, plain text.

The encryption function outlined above is one-way. This means that a sender cannot read another sender’s message even if he has the recipient’s public key.

Use cases

Most commonly, asymmetric cryptography is used to authenticate data using digital signatures.

Interesting fact: A digital signature is a mathematical technique for confirming the authenticity and integrity of a message, software or digital document. It is the digital equivalent of a handwritten signature or seal.

We also use asymmetric cryptography in areas such as:

  • Electronic mail. A public key can be used to encrypt a message and a private key to decrypt it.
  • SSL/TLS. That is, encrypted connections between websites and browsers. Yes, asymmetric encryption is also used here.
  • Cryptocurrencies. Users have their public keys, which everyone can see, and their private keys, which they keep secret. This ensures that only the rightful owners can spend the funds.

Advantages of asymmetric cryptography

First and foremost is security. It is increased because the private keys do not have to be disclosed.

Easy verification of the sender thanks to digital signatures. In addition, asymmetric cryptography enables non-repudiation, i.e. the sender cannot deny having sent the message in question.

Disadvantages of asymmetric cryptography

The method itself is slower than symmetric cryptography. Therefore, it is not used for decrypting mass messages.

The worst thing is that a person who loses his private key will not be able to decrypt the message. Speaking of keys, it is worth noting that public keys are not authenticated. So no one can assure us that the public key belongs to that particular person.

Some examples of asymmetric cryptography

  1. The most commonly used asymmetric algorithm is the RSA algorithm. It is embedded directly in SSl/TSL. The RSA algorithm derives its security from the difficulties involved in factoring large integers. These in turn are the product of two large prime numbers. RSA keys are usually 1024 or 2048 bits long.
  1. Elliptic Curve Cryptography (ECC). An alternative to RSA. This is a public key encryption technique based on elliptic curve theory. It can create faster, smaller or more efficient keys thanks to the properties of the elliptic curve. To crack the ECC algorithm, a cybercriminal must break the logarithm of the elliptic curve. This is definitely more difficult than factorization.


In asymmetric encryption, we need two types of keys – public and private – to decrypt the data sent to us. This increases the security of the messages being transmitted.

The idea of asymmetric encryption itself is not new. The concept was defined decades ago. In 1977, two researchers from Stanford University published a paper that dealt with this encryption technique. Over time, their idea spread and the result was this data protection solution.