67 - Encryption - Assymetric Cryptography

Each subject has two keys:

  • Public Key: Publicly disclosed by the subject, ensures confidentiality
  • Private Key: Kept secret, ensures authenticity

Hash Function

  • A hash function returns a hash value of fixed length, known as the digest, for any given input of data
  • Can be used to prove message integrity
Hash Function Integrity

If a message is sent together with its hash, the resulting digest will not match the digest of the message if it has been corrupted or tampered with in any way