From the course: iOS Development: Security

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Asymmetric cryptography overview

Asymmetric cryptography overview - iOS Tutorial

From the course: iOS Development: Security

Start my 1-month free trial

Asymmetric cryptography overview

- [Instructor] Asymmetric cryptography uses a pair of public and private keys to encrypt and decrypt data. These keys are basically large numbers that are mathematically related. The public key can be shared with whomever we want to exchange data securely, whereas the private key should be kept, well, private. Now let's see how asymmetric cryptography works. Say John wants to exchange information securely with Jane. John generates the public and private key pair on his computer. He then sends the public key to Jane, but the private key never leaves his computer. Jane receives John's public key and stores it on her computer. Jane encrypts a message using the public key she received. She then sends the encrypted message to John. The message can only be decrypted using the private key that matches the public key. Thus, only John can read it, seeing as he has the private key. If a third person who has the public key intercepts the message, he won't be able to decipher it unless he gets…

Contents