Public key Algorithms in Cryptography
2 min readJul 29, 2020
Private-Key Cryptography vs Public-Key Cryptography
- In private key cryptography, we use only one key to encrypt and decrypt messages and share key both the sender and receiver. This key also shares both receiver and sender.
- But in public-key cryptography, we use two keys to encryption for the public key and to decrypt for the private key. In this here, the private key knows only the sender. As well as users only share their public keys, not private keys.
Lets we discuss more about Public key Algorithms.
- We use two different keys that are mathematically related.
- This public key also public to everyone.
- But the private key is known as the only receiver.

- This encryption message read or change only the receiver. Then receiver can imagine this message is no one read or changed.
- But the sender cannot verify that message. Because we use the sender public key as the encryption key.
- This asymmetric algorithm has more examples. There are Diffie-Hellman, Digital Signature Standard (DSS), RSA encryption algorithms, ElGamal, and Elliptical curve techniques digital signature.
Next, we talk about What is the Digital Signature.
- If we encrypt any message’s hash value with sender’s private key, that we call Digital signature.

- Then, we send that encrypted hash value and original plain text message to the receiver, then receiver gets those and original plain text message hashing and signature(encrypted hash value) decrypt with sender’s public key and finally compare the result of those value if any difference have in hash values.
- The purpose of the digital signature is Authentication, Non-reputation, and integrity.
- We can use this in Software Distribution, Financial transactions, and Other cases where it is important to detect tampering and forgery.