Web3 Dictionary Logo
Web3 Dictionary
Contribute

Categories

AllBlockchainDappsDAOsDeFiNFTsRegulationSecuritySmart ContractsTokenomicsWalletsWeb3 GamingOthers
  1. Web3 Dictionary
  2. Security
  3. Public Key Cryptography
Security

Public Key Cryptography

A cryptographic system using paired keys: public key for encryption/verification, private key for decryption/signing.

Last Updated

2026-03-19

Related Concepts

Private KeyDigital Signature
Web3-Explorer Logo

Web3 Security

AD

Security frameworks, smart contract reviews, and compliance alignment to reduce risk and protect users.

Review Security Services

What is Public Key Cryptography?

Public key cryptography, or asymmetric cryptography, is a security system using a pair of mathematically linked keys to secure data. It is the foundational technology that enables trustless blockchain interactions by allowing users to prove identity without revealing secret keys.

How does Public Key Cryptography work?

  1. An algorithm generates a unique pair of linked keys: one public and one private.
  2. Data encrypted with a public key can only be decrypted by the corresponding private key.
  3. Users sign messages with their private key to prove the data's origin.
  4. Anyone with the public key can verify the digital signature's authenticity.
  5. In blockchains, public keys derive wallet addresses while private keys authorize transactions.

Why does Public Key Cryptography matter?

This system allows for secure financial transactions over the open internet without needing a central authority to manage passwords. It provides the mathematical guarantee that only the owner of a private key can control the assets in their account.

Key features of Public Key Cryptography

  • Uses mathematically paired keys for encryption and digital signatures
  • Proves ownership and authorization without sharing secret information
  • Serves as the foundation for blockchain identity and transaction security
  • Highly resistant to brute-force attacks due to large-number mathematics
  • Eliminates the need for vulnerable central password databases

Examples of Public Key Cryptography

Bitcoin and Ethereum use the ECDSA algorithm to generate the key pairs that secure every wallet on their networks. This same technology is used by secure websites to establish encrypted connections, often indicated by a padlock icon in your browser.

External References

  • Smart Contract Security
  • Public Key Cryptography