Pardon the dust, this webpage is Under Construction
Asymmetric Key Generator
What is Asymmetric cryptography and keys?
Asymmetric cryptography, also known as public-key cryptography, is a process that DEXIT™ uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use.
A public key is a cryptographic key that can be used by any person to encrypt a message so that it can only be decrypted by the intended recipient with their private key. A private key -- also known as a secret key -- is shared only with key's initiator.
DEXIT™ makes asymmetric keys. When someone wants to send an encrypted message, they can pull the intended recipient's public key from a DEXIT™ and use it to encrypt the message before sending it. The recipient of the message can then decrypt the message using their related private key.
If the sender encrypts the message using their private key, the message can be decrypted only using that sender's public key, thus authenticating the sender. These encryption and decryption processes happen automatically; users do not need to physically lock and unlock the message.
Asymmetric keys, also known as public/private key pairs, are used for asymmetric encryption. Asymmetric encryption is used mainly to encrypt and decrypt session keys and digital signatures. Asymmetric encryption uses public key encryption algorithms.
When one key of a key pair is used to encrypt a message, the other key from that pair is required to decrypt the message.
Thus if user A's public key is used to encrypt data or message, only user A (or someone who has access to user A's private key) can decrypt the data or message.
If user A's private key is used to encrypt a piece of data or message, only user A's public key will decrypt the data or message, thus indicating that user A (or someone with access to user A's private key) did the encryption.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.