Blockchain & DLTFoundations

Public Key Cryptography

Overview

Direct Answer

Public key cryptography is an asymmetric encryption system using mathematically linked key pairs where a public key encrypts data and a corresponding private key decrypts it. This approach enables secure communication and digital signing without requiring prior exchange of secret keys.

How It Works

The system relies on mathematical trapdoor functions—typically factorisation of large primes or discrete logarithm problems—that are computationally easy in one direction but infeasible to reverse without the private key. A sender encrypts a message using the recipient's publicly available key; only the holder of the matching private key can decrypt it. Digital signatures work inversely: a sender signs with their private key, and others verify authenticity using the sender's public key.

Why It Matters

Organisations deploy this approach to establish trust across untrusted networks without shared secrets, critical for blockchain consensus mechanisms, certificate authorities, and secure communication infrastructure. It enables non-repudiation—signatories cannot deny having signed data—essential for compliance, authentication, and transactional integrity in regulated industries.

Common Applications

Bitcoin and Ethereum use elliptic curve cryptography for address derivation and transaction signing. TLS/SSL certificates protect web commerce. Digital signatures authenticate software releases and legal documents. Cryptocurrency wallets rely on it for private key management and asset ownership verification.

Key Considerations

Computational overhead is higher than symmetric encryption, making hybrid approaches common. Private key compromise is irreversible and catastrophic; key management discipline is non-negotiable. Quantum computing poses a theoretical future threat to widely-used algorithms like RSA and ECDSA.

Cross-References(1)

Cybersecurity

More in Blockchain & DLT

See Also