From the course: iOS Development: Security
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Asymmetric cryptography overview - iOS Tutorial
From the course: iOS Development: Security
Asymmetric cryptography overview
- [Instructor] Asymmetric cryptography uses a pair of public and private keys to encrypt and decrypt data. These keys are basically large numbers that are mathematically related. The public key can be shared with whomever we want to exchange data securely, whereas the private key should be kept, well, private. Now let's see how asymmetric cryptography works. Say John wants to exchange information securely with Jane. John generates the public and private key pair on his computer. He then sends the public key to Jane, but the private key never leaves his computer. Jane receives John's public key and stores it on her computer. Jane encrypts a message using the public key she received. She then sends the encrypted message to John. The message can only be decrypted using the private key that matches the public key. Thus, only John can read it, seeing as he has the private key. If a third person who has the public key intercepts the message, he won't be able to decipher it unless he gets…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
-
(Locked)
Asymmetric cryptography overview1m 25s
-
(Locked)
Creating the private key5m 49s
-
(Locked)
Retrieving the private key from the Keychain4m 32s
-
(Locked)
Defining the asymmetric key accessors2m 9s
-
(Locked)
Performing asymmetric encryption4m 10s
-
(Locked)
Performing asymmetric encryption continued2m 26s
-
(Locked)
Performing asymmetric decryption3m 41s
-
(Locked)
Asymmetric encryption and decryption demo3m 9s
-
(Locked)
-