Thank you, Claude for replying to this post. Otherwise, I might have missed it.
Patents were awarded in the 70s. Sometime later, both GCHQ and NSA revealed they were in asymmetric space in the late 60s. The first large-scale deployment was a U.S. Government project in the 80s. Entrust was the first publicly available in the 90s. Asymmetric crypto enables online commerce. In fact, I suspect pretty much everyone reading these threads is using the technology.
One other correction. Cryptography is not solely about encryption. Cryptography also provides other services like message integrity and non-repudiation. Blockchain is an excellent example. The units (aka Blocks) are bound together in a chain using cryptography but the payloads are in the clear.
CSA might want to consider correcting the post to talk about large-scale adoption and being widely known.
------------------------------
Alex Sharpe
Principal
Sharpe42
[email protected]------------------------------
Original Message:
Sent: Oct 19, 2022 08:48:27 PM
From: Claude Baudoin
Subject: #TechTopicTuesday
Relatively new??? Yeah, and I am relatively young too!
Asymmetric encryption, aka public-key cryptography, dates back to the 1970s, almost 50 years ago. At the speed at which the computing field evolves, this is ancient. See Public-key cryptography - Wikipedia.
------------------------------
Claude Baudoin
cébé IT Knowledge Management
Co-Chair, OMG Cloud Working Group
https://www.omg.org/cloud
Original Message:
Sent: Oct 18, 2022 06:11:33 AM
From: Orbert Reavis
Subject: #TechTopicTuesday
This week's Word of the Week is: Asymmetric Encryption! Asymmetric Encryption is a relatively new encryption method that uses mathematically linked public and private key pairs to encrypt and decrypt data between trusted parties.
Because symmetric encryption only uses a single key, anyone who steals or copies that key can easily decrypt data and communications. In contrast, the asymmetric encryption model allows for freely sharing the public key, with the private key strictly controlled and protected by the key pair owner. Learn more about asymmetric encryption and more cloud key management techniques in this blog → https://csaurl.org/qrgx7s
#cloudsecurity #CKM #riskmanagement

------------------------------
Orbert Reavis
Circle Guide
CSA
------------------------------