Asymmetric Cryptography Demo (Public/Private Key Encryption with RSA-OAEP)

👩
Alice (Sender)

Alice will encrypt a message using Bob's public key.

🔓 Alice's Public Key: copy
Public key will appear here...
🔐 Alice's Private Key: copy
Private key will appear here...
👨
Bob (Receiver)

Bob will decrypt the message using his private key.

🔓 Bob's Public Key: copy
Public key will appear here...
🔐 Bob's Private Key: copy
Private key will appear here...
1
Alice Encrypts

Alice uses Bob's public key to encrypt her message.

2
Encrypted Message

Can only be decrypted with Bob's private key!

Encrypted message will appear here...
3
Bob Decrypts

Bob uses his private key to decrypt the message.

About Asymmetric Cryptography

Asymmetric cryptography uses two different keys: a public key for encryption and a private key for decryption. This demo uses RSA-OAEP, one of the most widely-used asymmetric encryption algorithms.

Real-world use: When you visit an HTTPS website, browsers use the server's public key to establish a secure connection. This is the foundation of secure internet communication.