What is Asymmetric Cryptography?

Definition: Asymmetric cryptography is a cryptographic system in which each user has a private key that is kept secret and is used to generate a public key (which is freely provided to others). Users can use their private key to digitally sign data, and the resulting signature can be verified by anyone who has the corresponding public key.


Asymmetric Cryptography explained

Asymmetric encryption uses one key - the public key, to encrypt, and a different but mathematically related key - the private key, to decrypt. These keys work as a matched set (or a ‘key pair’). If the only thing known is the public key, determining the private key is computationally impossible. As a result, the public key can be distributed widely while the private key remains private and secure.

This interdependence provides a variety of benefits, the most important of which are most likely digital signatures. Digital signatures are used to ensure that a message was created by a specific entity and to authenticate remote systems or users, among other things.

Private keys are not shared and can be stored in the software or operating system that is used, or on hardware such as a hardware security module (HSM) that provides higher levels of data security and trust.

Asymmetric cryptography is also referred to as public key cryptography.



Blog posts

Blog posts

Related products

Related products

Contact us

We look forward to answering your questions.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      About Utimaco's Downloads

      Visit our Downloads section and select from resources such as brochures, data sheets, white papers and much more. You can view and save almost all of them directly (by clicking the download button).

      For some documents, your e-mail address needs to be verified. The button contains an e-mail icon.

      Download via e-mail


      A click on such a button opens an online form which we kindly ask you to fill and submit. You can collect several downloads of this type and receive the links via e-mail by simply submitting one form for all of them. Your current collection is empty.