What is Public Key Cryptography?
There are several techniques of encryption, and public-key cryptography or asymmetric cryptography, uses two mathematically related, but not identical keys – a public key and a private key. Usually, algorithms rely on a key to encrypt or decrypt and in public-key cryptography, each key performs a unique function. The public key is used to encrypt and the private key is used to decrypt. What differentiates this encryption mechanism from others is that it is computationally not feasible to derive the private key based on the public key. Public keys are shared freely and this allows users an easy and convenient…