expand for answer

Public Key Cryptosystem / Public Key Cryptography

A subset of asymmetric cryptography based on the use of a key pair set consisting of a public key and a private key. Messages encrypted with one key from the pair can be decrypted only with the other key from the same pair.

Similar items:
This is an information system utilizing an algorithm or series of algorithms which provide a cryptographic key pair consisting of a private key and a corresponding public key. The keys of the pair have the properties that (1) the public key can verify a digital signature that the private key creates, and (2) it is computationally infeasible to discover or derive the private key from the public key. The public key can therefore be disclosed without significantly risking disclosure of the private key. This can be used for confidentiality as well as for authentication.
A secret value that is used to encrypt or decrypt messages and is kept secret and known only to the user; used in conjunction with a public key in asymmetrical cryptography. The private or secret key of a key pair, which must be kept confidential and is used to decrypt messages encrypted with the public key, or to digitally sign messages, which can then be validated with the public key.
A value that is used to encrypt or decrypt messages and is made public to any user and used with a private key in asymmetric cryptography. In an asymmetric cryptography scheme, the key that may be widely published to enable the operation of the scheme. Typically, a public key can be used to encrypt, but not decrypt, or to validate a signature, but not to sign.
An asymmetric cryptosystem where the encrypting and decrypting keys are different and it is computationally infeasible to calculate one form the other, given the encrypting algorithm. In public key cryptography, the encrypting key is made public, but the decrypting key is kept secret.
A system that randomly generates a private key, and is used only once to encrypt a message that is then decrypted by the receiver using a matching onetime pad and key. Onetime pads have the advantage that there is theoretically no way to “break the code” by analyzing a succession of messages. Manual onetime cryptosystem produced in pad form.

There are no comments yet.

Authentication required

You must log in to post a comment.

Log in