[{"data":1,"prerenderedAt":77},["ShallowReactive",2],{"term-a\u002Fasymmetric-encryption":3,"related-a\u002Fasymmetric-encryption":60},{"id":4,"title":5,"acronym":6,"body":7,"category":40,"description":41,"difficulty":42,"extension":43,"letter":44,"meta":45,"navigation":46,"path":47,"related":48,"seo":54,"sitemap":55,"stem":58,"subcategory":6,"__hash__":59},"terms\u002Fterms\u002Fa\u002Fasymmetric-encryption.md","Asymmetric Encryption",null,{"type":8,"value":9,"toc":33},"minimark",[10,15,19,23,26,30],[11,12,14],"h2",{"id":13},"eli5-the-vibe-check","ELI5 — The Vibe Check",[16,17,18],"p",{},"Asymmetric encryption uses two different keys — one to lock (public key), one to unlock (private key). It's like a padlock: anyone can close it, but only you have the key to open it. This is how HTTPS and SSH work. Slower than symmetric, but way more practical for the internet.",[11,20,22],{"id":21},"real-talk","Real Talk",[16,24,25],{},"Asymmetric encryption uses a mathematically linked key pair: a public key for encryption and a private key for decryption. The security relies on the computational difficulty of reversing the mathematical relationship. Used in TLS handshakes, SSH, and digital signatures. Common algorithms: RSA, ECC.",[11,27,29],{"id":28},"when-youll-hear-this","When You'll Hear This",[16,31,32],{},"\"TLS uses asymmetric encryption during the handshake, then switches to symmetric for speed.\" \u002F \"SSH public key authentication is asymmetric encryption in action.\"",{"title":34,"searchDepth":35,"depth":35,"links":36},"",2,[37,38,39],{"id":13,"depth":35,"text":14},{"id":21,"depth":35,"text":22},{"id":28,"depth":35,"text":29},"security","Asymmetric encryption uses two different keys — one to lock (public key), one to unlock (private key).","intermediate","md","a",{},true,"\u002Fterms\u002Fa\u002Fasymmetric-encryption",[49,50,51,52,53],"Symmetric Encryption","Public Key","Private Key","TLS","Encryption",{"title":5,"description":41},{"changefreq":56,"priority":57},"weekly",0.7,"terms\u002Fa\u002Fasymmetric-encryption","ezyX94Jw1WkoZSIdCNZqiOEVrwVU28KDGD7rdaIUr54",[61,65,68,71,74],{"title":53,"path":62,"acronym":6,"category":40,"difficulty":63,"description":64},"\u002Fterms\u002Fe\u002Fencryption","beginner","Encryption is scrambling your message into gibberish so only someone with the secret decoder ring can read it.",{"title":51,"path":66,"acronym":6,"category":40,"difficulty":42,"description":67},"\u002Fterms\u002Fp\u002Fprivate-key","A private key is the secret key that only YOU keep. It can decrypt messages encrypted with your public key, or sign messages to prove they came from you.",{"title":50,"path":69,"acronym":6,"category":40,"difficulty":42,"description":70},"\u002Fterms\u002Fp\u002Fpublic-key","A public key is like your open mailbox — anyone can drop a message in it (encrypt data with it), but only you have the key to open the box and read it (you...",{"title":49,"path":72,"acronym":6,"category":40,"difficulty":42,"description":73},"\u002Fterms\u002Fs\u002Fsymmetric-encryption","Symmetric encryption uses the same key to lock and unlock data. Like a house key — whoever has a copy can both lock and unlock the door.",{"title":52,"path":75,"acronym":52,"category":40,"difficulty":42,"description":76},"\u002Fterms\u002Ft\u002Ftls","TLS (Transport Layer Security) is the updated, actually-secure version of SSL. It's the technology that puts the padlock in your browser's address bar.",1776518256389]