Glossary:Public key cryptography: Difference between revisions

(Created page with "Public key or asymmetric cryptography is a form of encryption using separate keys for encryption and decryption, neither of which can be derived from the other. The public key can be used to encrypt messages which only the holder of the corresponding private key can decrypt. Alternatively, the holder of a private key can "digitally sign" a message by encrypting a digest of the message with his private key. By successfully decrypting the digest with the previously publish...")
 
No edit summary
Line 1: Line 1:
Public key or asymmetric cryptography is a form of encryption using separate keys for encryption and decryption, neither of which can be derived from the other. The public key can be used to encrypt messages which only the holder of the corresponding private key can decrypt. Alternatively, the holder of a private key can "digitally sign" a message by encrypting a digest of the message with his private key. By successfully decrypting the digest with the previously published public key, a recipient can prove the authorship of the message.
Public key or asymmetric cryptography is a form of encryption using separate keys for encryption and decryption, neither of which can be derived from the other. The public key can be used to encrypt messages which only the holder of the corresponding private key can decrypt. Alternatively, the holder of a private key can "digitally sign" a message by using it to encrypt a digest of the message, sent with the message itself. A recipient can prove the authorship of the message by successfully decrypting the digest using the author's previously published public key.

Revision as of 15:23, 22 February 2024

Public key or asymmetric cryptography is a form of encryption using separate keys for encryption and decryption, neither of which can be derived from the other. The public key can be used to encrypt messages which only the holder of the corresponding private key can decrypt. Alternatively, the holder of a private key can "digitally sign" a message by using it to encrypt a digest of the message, sent with the message itself. A recipient can prove the authorship of the message by successfully decrypting the digest using the author's previously published public key.