**Not a premium member yet?** Save 100's of hours on lesson prep with a comprehensive library of GCSE Computer Science resources - including worksheets, tests, and PowerPoint presentations.

Download the complete GCSE Computer Science bundle including all teacher resources and student revision:

**200+ Computer Science/ICT resources**

+ any we release in the future!**Access to all student revision notes****OCR, AQA, Edexcel and WJEC compatible****New 9-1 GCSE spec**

**Asymmetrical encryption,** also known as **public key cryptography**, is a relatively new technique, compared to symmetric encryption. Asymmetric encryption utilises two keys to encrypt a plain text. Private keys are exchanged over the internet or a large network. It guarantees that malicious persons do not misuse the keys. It is significant to note that anyone with a private key can decrypt the message and therefore asymmetrical encryption utilises two linked keys to furthering security.

A public key is made easily available to anyone who might want to send you a message. The second private key is kept undisclosed so that you can only know.

A message that is ciphered using a public key can only be deciphered using a private key and a message ciphered using a private key can be deciphered using a public key. Security of the public key is not essential because it is publicly accessible and can be sent over the internet. An asymmetric key is more powerful in warranting the safety of information transmitted during communication.

Asymmetric encryption is widely used in daily communication channels, especially over the internet.

## Examples of Asymmetric Encryption

- ElGamal
- RSA (Rivest–Shamir–Adleman)
- DSA (Digital Signature Algorithm)
- ECC (Elliptic Curve Cryptography)
- PKCS (Public Key Cryptography Standards)

RSA is the most widely used asymmetric algorithm. It is embedded in the SSL/TLS protocol which is used to offer communications safety over a computer network.

RSA stems its security from the computational strain of factoring large integers that are the product of two large prime numbers. Multiplying two large primes is easy, but the difficulty of identifying the original numbers from the total, factoring, forms the basis of public key cryptography security. The time it takes to factor the product of two adequately large primes is beyond the skills of most attackers, excluding nation-state actors who may have access to adequate computing power.

RSA keys are usually 1024 or 2048-bits long, but professionals believe that 1024-bit keys could be cracked soon, which is why government and industry are moving to a minimum key length of 2048-bits.

ECC is earning approval from many security experts as a substitute to RSA for executing public-key cryptography. ECC is a public key encryption technique based on elliptic curve theory that can generate faster, smaller and more efficient cryptographic keys. ECC creates keys through the attributes of the elliptic curve equation. To break ECC, one must calculate an elliptic curve discrete logarithm and it turns out that this is a significantly tougher problem than factoring. As a result, ECC key sizes can be significantly smaller than those required by RSA yet provide equivalent security with lower computing power and battery resource usage making it more appropriate for mobile applications than RSA.

## Difference Between Symmetric and Asymmetric Encryption

- Symmetric encryption uses a singular key that must be shared among the people who need to receive the message while asymmetrical encryption uses a pair of public key and a private key to encrypt and decrypt messages when communicating.
- Symmetric encryption is an old practice while asymmetric encryption is relatively new.
- Asymmetric encryption was brought in to fix the inherent problem of the need to share the key in symmetrical encryption model, removing the need to share the key by using a pair of public-private keys.
- Asymmetric encryption eats up more time than the symmetric encryption.

When it comes to encryption, the latest systems may inevitably be the best fit. You should always use the encryption procedure that is applicable for the task at hand. In fact, as cryptography takes a new swing, new procedures are being established in a bid to catch up with the eavesdroppers and protect information to improve privacy. Hackers are destined to make it hard for experts in the coming years, thus expect more from the cryptographic community.