Symmetric/Asymmetric Encryption and Digital Signatures
Let's explore the categories of public-key encryption schemes and how digital signatures assure the integrity of a signature.
As we have already explained, symmetric cryptography is mainly based on randomization. On the other hand, asymmetric cryptography does not rely only on randomization because it allows an easy computation in the forward direction (e.g., generating the key pair), but makes the inverse computation extremely hard (e.g. discovering the private key from the public key). The main building block for asymmetric cryptography is so-called intractable problems.
Intractable problems
Intractable problems are problems for which there is no known efficient algorithm to solve.
Types
There are two main types of intractable problems: