7 Public Key Encryption and Digital Signatures: Unleashing RSA
This chapter covers
- Using RSA encryption with JSON Web Encryption
- Using RSA signatures with JSON Web Signature
When you buy products online, look for directions to a restaurant, interact with friends and strangers on a social network, or collaborate with coworkers on a video conference call, you depend on public key cryptography. Without public key cryptography, the Internet as we know it would not exist.
Secure communication on the internet relies on the Transport Layer Security (TLS) protocol, which is built upon public key cryptography algorithms. Mastering TLS is a vital skill for any developer. With a solid understanding of public key cryptography, configuring and troubleshooting TLS connections becomes straightforward. Without this knowledge, you may find yourself blindly copying commands from blogs, hoping your changes will fix issues. Public key cryptography is not just a tool—it's an essential foundation for any developer working with secure applications.