symmetric-encryption

High-quality technical overview of Symmetric Encryption in the context of blockchain security.

Asymmetric [encryption](/en/terms/asymmetric-encryption) is the cornerstone of blockchain technology. Unlike symmetric encryption (where the same key is used to lock and unlock), asymmetric encryption uses two related but different keys. The Public Key acts like your mailbox address (anyone can see it and send you mail), while the Private Key is the physical key to the mailbox that only you possess. This allows for secure communication and digital signatures without ever having to share a master password.

        graph LR
  Center["symmetric-encryption"]:::main
  Rel_asymmetric_encryption["asymmetric-encryption"]:::related -.-> Center
  click Rel_asymmetric_encryption "/terms/asymmetric-encryption"
  Rel_homomorphic_encryption["homomorphic-encryption"]:::related -.-> Center
  click Rel_homomorphic_encryption "/terms/homomorphic-encryption"
  classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
  classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
  classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
  classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
  linkStyle default stroke:#4b5563,stroke-width:2px;

      

🧠 Knowledge Check

1 / 1

🧒 Explain Like I'm 5

🔐 Imagine a magic padlock that comes with two keys. One key can ONLY lock the box (the [Public Key](/en/terms/public-key)), and the other key can ONLY unlock it (the [Private Key](/en/terms/private-key)). You can give the 'locking key' to everyone in the world, so they can send you secret boxes. But only you can open them because you kept the 'unlocking key' hidden under your pillow.

🤓 Expert Deep Dive

The security of asymmetric [encryption](/en/terms/asymmetric-encryption) relies on Trapdoor Functions—mathematical problems that are easy to compute in one direction but virtually impossible to reverse without a 'trapdoor' (the private key). Modern blockchains primarily use Elliptic Curve Cryptography (ECC), specifically the secp256k1 curve for Bitcoin and Ethereum, rather than older RSA methods. ECC provides equivalent security to RSA but with significantly smaller key sizes (256-bit ECC vs 3072-bit RSA), making transaction processing much more efficient for nodes. It enables two critical functions: Encryption (securing data) and Digital Signatures (proving ownership of an address without revealing the private key).

📚 Sources