Section II: Cryptographic Primitives
April 9, 2026
Public-Key Cryptography and Asymmetric Cryptography are synonymous and mean the same thing.
| Feature | Symmetric | Asymmetric |
|---|---|---|
| Keys | Same for encrypt/decrypt | Public/Private pair |
| Speed | Very fast | Slower (computationally heavy) |
| Security Basis | Shared secret | Mathematical one-way function |
| Scalability | Poor — \(\frac{n(n-1)}{2}\) keys | Excellent — 2 keys per user |
| Use Case | Bulk data encryption | Key exchange, authentication, signatures |
| Problem | Description | Used In | Current Status |
|---|---|---|---|
| Integer Factorization | Given \(N = p × q\), find \(p,q\). | RSA | No polynomial-time algorithm known |
| Discrete Logarithm | Given \(g, y = g^{x} \bmod p\), find \(x\). | Diffie–Hellman, DSA | Hard for large p |
| Elliptic Curve DL | Given P, Q = kP on curve, find k. | ECC, ECDH, ECDSA | Harder per bit than RSA |
| Property | RSA | ECC |
|---|---|---|
| Underlying Problem | Integer factorization | Elliptic-curve discrete log |
| Typical Key Size (≈128-bit security) | 3072 bits | 256 bits |
| Performance | Slower key generation & decryption | Faster operations, smaller keys |
| Bandwidth / Storage | Larger certificates & signatures | Compact and efficient |
| Adoption | Legacy (TLS, email) | Modern systems, blockchain (e.g., Bitcoin, Ethereum) |
{"user": "alice", "role": "admin"}) secured by a digital signature.pac4j-jwt security library allowed attackers to completely bypass authentication.Attacker Mindset: Don’t break the cryptography; find a way to make the system ignore it.

Asymmetric Encryption & Digital Signatures — Army Cyber Institute — April 9, 2026