Posts

Showing posts from February, 2020

How Asymmetric Algorithm works

Image
Asymmetric Algorithms are algorithms which are used to encrypt data that is needed to be transmitted from one PC to another over a network. These algorithms are used in " Asymmetric Cryptography " or " Public Key Cryptography ". Asymmetric Algorithms uses a Public key to encrypt the data(Plain text) before sending, and a Private key to decrypt it by the Receiver. Scenario There are 3 components taking part in this Scenario The objective in this scenario that if the User requests for a Web-page/Web service through the internet from a Server, the Server in turn should reply to the request of the User and then the User uses this service where transmission of (private)data can get involved. So is the reply/request communications between the user and the server secure enough, can any third party unauthorized person gain access to these data while transmission and spy/change/corrupt these data. Real life Example with the problems faced "You requ