IFCCI

Digital Signatures & Bitcoin Transactions

What Is Asymmetric Encryption?

3 min bacaanPelajaran 3 dari 11
27%

Objektif Pembelajaran

  1. 1Explain how asymmetric (public-key) encryption works using a key pair
  2. 2Understand the principle that what one key encrypts, only the other can decrypt
  3. 3Recognize how asymmetric encryption enables secure communication between strangers
  4. 4Understand how Bitcoin uses asymmetric cryptography for ownership verification rather than message privacy

What Is Asymmetric Encryption?

Asymmetric encryption, also known as public-key cryptography, is a type of encryption that uses two separate but mathematically linked keys:

  • A public key – which can be shared openly
  • A private key – which must be kept secret

Together, these two keys form what’s called a key pair.

The key idea is this:
What one key encrypts, only the other can decrypt.

How Does Asymmetric Encryption Work?

Let’s break it down with a simple example:

  1. Suppose you want to send a private message to someone.
  2. You encrypt the message using their public key.
  3. Only their private key can decrypt and read it.

Even if someone else intercepts the message, they can’t decrypt it because they don’t have the private key.

Why Is It Called Public-Key Encryption?

Because anyone can have access to the public key—but only the person with the matching private key can read the encrypted message. That’s what makes it secure.

This method is commonly used to send confidential data over the internet.

A Fun Example

Let’s say I’m writing a love letter to your mom (hypothetically).
If I want it to stay private, I would:

  1. Encrypt the message using her public key.
  2. Send the encrypted message over the internet.
  3. Only your mom, who has the matching private key, can decrypt it and read it.

Even if you or anyone else intercepted the message, you couldn’t read it—because you don’t have her private key.

How Asymmetric Encryption Is Used in Cryptocurrencies

Originally, asymmetric encryption was designed for privacy—to protect messages.

But in cryptocurrencies, the purpose is different. It’s not about keeping information secret, but about proving ownership and authenticating actions.

Here’s how it works:

  • Instead of encrypting with the recipient’s public key, the sender uses their private key to sign a message (like a transaction).
  • Anyone can use the sender’s public key to verify the message.
  • This proves the message was really sent by the person who owns the private key—because only they could’ve created it.

It’s like stamping a document with a unique signature only you can produce.

Why This Works

Because if you encrypt something with your private key, and someone else can successfully decrypt it using your public key, it proves that you were the one who sent it.

So in crypto:

  • You’re not trying to hide the message.
  • You’re using asymmetric encryption to prove authenticity—that you’re the true owner of the bitcoins you’re trying to send.

Summary

  • Asymmetric encryption uses a key pair: one public, one private.
  • Originally used to secure private communications, it’s now also used for authentication.
  • In crypto, it’s not about hiding information—it’s about proving ownership.
  • By using your private key to sign a transaction, you prove you’re authorized to spend the funds without revealing your private key.

Poin Utama

  1. 1Asymmetric encryption uses two mathematically linked keys: a public key (shared openly) and a private key (kept secret)
  2. 2What one key encrypts, only the other key can decrypt—this enables secure communication without needing to share secret keys
  3. 3In Bitcoin, asymmetric cryptography is used not to hide messages but to prove ownership of funds through digital signatures
  4. 4The public key can be freely distributed while the private key must remain secret, as it controls access to funds

Knowledge Check

1. In asymmetric encryption, what is the relationship between the public key and private key?