Szyfrowanie asymetryczne

A system using dual keys for secure encryption and digital signatures.

Asymmetric encryption is the cornerstone of blockchain technology. Unlike symmetric encryption (where the same key is used to lock and unlock), asymmetric encryption uses two related but different keys. The Public Key acts like your mailbox address (anyone can see it and send you mail), while the Private Key is the physical key to the mailbox that only you possess. This allows for secure communication and digital signatures without ever having to share a master password.

🛡️ Trust Score

100%

✅ Zweryfikowane fakty techniczne

  • Asymmetric encryption uses two different keys: a public key and a private key.
  • The public key can be shared openly with anyone.
  • The private key must be kept secret by the owner.
  • Data encrypted with the public key can only be decrypted with the matching private key.
  • Digital signatures are created using the private key and verified with the public key.
  • Blockchains like Bitcoin and Ethereum use Elliptic Curve Cryptography (ECC) for security.
        graph LR
  Center["Szyfrowanie asymetryczne"]:::main
  Pre_cryptography["cryptography"]:::pre --> Center
  click Pre_cryptography "/terms/cryptography"
  Pre_mathematics["mathematics"]:::pre --> Center
  click Pre_mathematics "/terms/mathematics"
  Rel_public_key["public-key"]:::related -.-> Center
  click Rel_public_key "/terms/public-key"
  Rel_private_key["private-key"]:::related -.-> Center
  click Rel_private_key "/terms/private-key"
  Rel_elliptic_curve_cryptography_ecc["elliptic-curve-cryptography-ecc"]:::related -.-> Center
  click Rel_elliptic_curve_cryptography_ecc "/terms/elliptic-curve-cryptography-ecc"
  classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
  classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
  classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
  classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
  linkStyle default stroke:#4b5563,stroke-width:2px;

      

🧒 Wyjaśnij jak 5-latkowi

🔐 To jak posiadanie kłódki, którą otwartą zostawiasz w publicznym miejscu : każdy może ją zatrzasnąć, ale tylko Ty masz klucz, żeby ją otworzyć.

🤓 Expert Deep Dive

W blockchainie szyfrowanie asymetryczne umożliwia tworzenie podpisów cyfrowych. Dzięki nim sieć wie, że transakcja pochodzi od prawowitego właściciela środków, bez ujawniania jego hasła.

🔗 Powiązane terminy

Wymagana wiedza:

📚 Źródła