Asymmetric cryptography, also known as public-key cryptography, is a process that DEXDash uses a pair of related keys -- one public key and one private key -- to encrypt and decrypt a message and protect it from unauthorized access or use.
A public key is a cryptographic key that can be used by any person to encrypt a message so that it can only be decrypted by the intended recipient with their private key. A private key -- also known as a secret key -- is shared only with key's initiator.
DEXDash makes asymmetric keys. When someone wants to send an encrypted message, they can pull the intended recipient's public key from a DEXDash and use it to encrypt the message before sending it. The recipient of the message can then decrypt the message using their related private key.
If the sender encrypts the message using their private key, the message can be decrypted only using that sender's public key, thus authenticating the sender. These encryption and decryption processes happen automatically; users do not need to physically lock and unlock the message.
Asymmetric keys, also known as public/private key pairs, are used for asymmetric encryption. Asymmetric encryption is used mainly to encrypt and decrypt session keys and digital signatures. Asymmetric encryption uses public key encryption algorithms.
When one key of a key pair is used to encrypt a message, the other key from that pair is required to decrypt the message.
Thus if user A's public key is used to encrypt data or message, only user A (or someone who has access to user A's private key) can decrypt the data or message.
If user A's private key is used to encrypt a piece of data or message, only user A's public key will decrypt the data or message, thus indicating that user A (or someone with access to user A's private key) did the encryption.