Overview
Direct Answer
Public key cryptography is an asymmetric encryption system using mathematically linked key pairs where a public key encrypts data and a corresponding private key decrypts it. This approach enables secure communication and digital signing without requiring prior exchange of secret keys.
How It Works
The system relies on mathematical trapdoor functions—typically factorisation of large primes or discrete logarithm problems—that are computationally easy in one direction but infeasible to reverse without the private key. A sender encrypts a message using the recipient's publicly available key; only the holder of the matching private key can decrypt it. Digital signatures work inversely: a sender signs with their private key, and others verify authenticity using the sender's public key.
Why It Matters
Organisations deploy this approach to establish trust across untrusted networks without shared secrets, critical for blockchain consensus mechanisms, certificate authorities, and secure communication infrastructure. It enables non-repudiation—signatories cannot deny having signed data—essential for compliance, authentication, and transactional integrity in regulated industries.
Common Applications
Bitcoin and Ethereum use elliptic curve cryptography for address derivation and transaction signing. TLS/SSL certificates protect web commerce. Digital signatures authenticate software releases and legal documents. Cryptocurrency wallets rely on it for private key management and asset ownership verification.
Key Considerations
Computational overhead is higher than symmetric encryption, making hybrid approaches common. Private key compromise is irreversible and catastrophic; key management discipline is non-negotiable. Quantum computing poses a theoretical future threat to widely-used algorithms like RSA and ECDSA.
Cross-References(1)
More in Blockchain & DLT
Maximal Extractable Value
FoundationsThe maximum profit that can be extracted from block production by reordering, inserting, or censoring transactions, a fundamental economic phenomenon in blockchain networks.
Light Node
FoundationsA blockchain node that only downloads block headers and relies on full nodes for complete transaction verification.
Fork
FoundationsA divergence in a blockchain's protocol or chain, creating two separate paths — can be hard (incompatible) or soft (backward-compatible).
Hot Wallet
FoundationsA cryptocurrency wallet connected to the internet for convenient but less secure asset management.
ERC-721
Tokens & AssetsA technical standard for non-fungible tokens on the Ethereum blockchain, ensuring each token is unique.
Mining
FoundationsThe process of using computational power to validate transactions and add new blocks to a proof-of-work blockchain.
Token
Tokens & AssetsA digital asset created and managed on a blockchain, representing value, utility, or ownership rights.
Cross-Chain Bridge
Protocols & NetworksInfrastructure enabling the transfer of assets and data between different blockchain networks.