2018-09-13 15:00:46 +00:00
|
|
|
---
|
2021-01-14 15:19:37 +00:00
|
|
|
title: Asymmetric Cryptography in Moner
|
2018-09-13 15:00:46 +00:00
|
|
|
---
|
|
|
|
# Asymmetric Cryptography in Monero
|
2018-01-06 13:41:04 +00:00
|
|
|
|
2018-01-18 12:00:19 +00:00
|
|
|
!!! note
|
2018-01-09 13:33:55 +00:00
|
|
|
Author is nowhere close to being a cryptographer. Be sceptical on accuracy.
|
2018-01-06 13:41:04 +00:00
|
|
|
|
2018-01-07 16:47:12 +00:00
|
|
|
Before we get to Monero specific stuff, a little bit of context. We are talking asymmetric cryptography here.
|
2018-01-06 13:41:04 +00:00
|
|
|
The "asymmetric" simply means the are two keys:
|
|
|
|
|
|
|
|
* the private key (used primarily for signing data and for decrypting data)
|
|
|
|
* the public key (used primarily for signature verification and encrypting data)
|
|
|
|
|
2018-08-20 07:43:05 +00:00
|
|
|
This is in contrast to symmetric cryptography which uses a single key. This key is a secret shared among the parties.
|
2018-01-06 13:41:04 +00:00
|
|
|
|
|
|
|
Historically, asymmetric cryptography was based on the problem of factorization of a very large integers
|
|
|
|
back into prime numbers (which is practically impossible for large enough integers).
|
|
|
|
|
|
|
|
Recently, asymmetric cryptography is based on a mathematical notion of elliptic curves.
|
2018-08-20 15:17:45 +00:00
|
|
|
Edwards25519 is a specific, well researched and standardized elliptic curve used in Monero.
|