Currently, there are widely used algorithms, there are mainly theoretical algorithms; There are algorithms that are still considered safe, some algorithms have been broken. It should be noted that widely used algorithms are not always guaranteed to be safe. Some algorithms have security proofs with different standards. For Public Key, also known as public encryption, the most obvious application is security: a text encrypted with a user’s public key can only be decrypted with the secret key of that person.
What is the public key?
A public key, also known as a public key, is a password that allows users to receive electronic money into their account. it together with private keys, are important tools needed to ensure the security of the cryptocurrency economy.
How does the public key work?
When a transaction is initiated by a user to send, for example, bitcoin, to another person, the transaction must be broadcast to the network where the distributed nodes (i.e. the people behind the computer) validate the transaction before completing and recording to the blockchain. Before the transaction is broadcast, it is digitally signed with a private key. The signature proves ownership of the private key, although it does not reveal the details of the private key to anyone. Because the Public Key is made up of a private key, the user’s public key is used to prove that the digital signature comes from his private key. Once the transaction has been verified as valid, money will be sent to the recipient’s public address.
Public Key is the foundation of many algorithms applied in security protocols such as RSA, ECC … Public encryption algorithms are applied in encrypting documents transmitted on the network, serving as a foundation for security protocols, the foundation of digital signatures …
Web applications are now developing very fast and are an inevitable trend of the times, especially when e-commerce is no longer something new today. In an online transaction in e-commerce, there is a lot of information transmitted between users and product suppliers such as user authentication, transaction information such as customer account information, single information. … The use of encryption algorithms, security protocols in web applications or more common.