create account

Question asked on Musing.io by xyzleo

View this thread on: hive.blogpeakd.comecency.com

Viewing a response to: @musing-threads/p34dxe83f

· @xyzleo ·
Question asked on Musing.io
<a href="https://musing.io/q/xyzleo/what-are-the-uses-of-asymmetric-cryptography"><b>View this question on Musing.io</b></a>
👍  
properties (23)
authorxyzleo
permlinkp32cpqkaf
categorymusing-threads
json_metadata"{"app":"musing/1.1","appTags":["blockchain"],"appCategory":"blockchain","appTitle":"What are the uses of asymmetric cryptography?","appBody":"","appDepth":1,"musingAppId":"aU2p3C3a8N","musingAppVersion":"1.1","musingPostType":"question"}"
created2019-07-17 09:13:18
last_update2019-07-17 09:13:18
depth1
children1
last_payout2019-07-24 09:13:18
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length124
author_reputation2,369,852,308,874
root_title"Musing Posts"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id88,397,661
net_rshares62,210,375
author_curate_reward""
vote details (1)
@crypto-wisdom ·
Question answered on Musing.io
<a href="https://musing.io/q/xyzleo/what-are-the-uses-of-asymmetric-cryptography">View this answer on Musing.io</a>
👍  
properties (23)
authorcrypto-wisdom
permlinkfkccnfksp
categorymusing-threads
json_metadata"{"app":"musing/1.1","appTags":["blockchain"],"appCategory":"blockchain","appTitle":"What are the uses of asymmetric cryptography?","appBody":"<p>Asymmetric cryptography is a cryptography system which uses public key and private key. Public key can be distributed widely and private key is known only to the owner. The cryptographic algorithm is designed in such a way that it produces one-way function. The distributed public key does not compromise with the security.&nbsp;</p>\n<p>So encryption of a message can be done using receiver's public key, but the decryption of that encrypted message can be done only with receiver's private key. &nbsp;This cryptographic system assures confidentiality, robust authentication, data storage etc.&nbsp;</p>\n<p>Therefore the most popular use-case of asymmetric cryptography is public key encryption &amp; digital signatures. In case of digital signatures, &nbsp;a message is signed with the sender's private key and can be verified by anyone who has access to the sender's public key. This verification proves that the sender had access to the private key, and therefore is likely to be the person associated with the public key.</p>","appDepth":2,"appParentPermlink":"p32cpqkaf","appParentAuthor":"xyzleo","musingAppId":"aU2p3C3a8N","musingAppVersion":"1.1","musingPostType":"answer"}"
created2019-07-17 10:59:51
last_update2019-07-17 10:59:51
depth2
children0
last_payout2019-07-24 10:59:51
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length115
author_reputation11,811,825,859,420
root_title"Musing Posts"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id88,400,519
net_rshares62,332,576
author_curate_reward""
vote details (1)