asymmetric cryptography


Also found in: Dictionary, Medical, Financial.

asymmetric cryptography

A very popular encryption method that uses two keys. When a message is sent to the only person entitled to view it, the recipient's public key is used by the sender to encrypt, and the recipient's secret key is used to decrypt.

With digital signatures, the sender's private key is used to encrypt a digest of the message, and the sender's public key is used to decrypt. See public key cryptography, digital signature and RSA.
References in periodicals archive ?
In the example seen in Figure 4, which uses asymmetric cryptography, the MIC is protected using the private component of the originator's public-key pair.
The company's unique combination of advanced asymmetric cryptography, the ubiquity of mobile devices and a unique distributed architecture provide protection from sophisticated online security threats.
Ensuring the true authentication of senders through the use of asymmetric cryptography (the "who")
The OneID service is based on a unique combination of advanced asymmetric cryptography, the ubiquity of mobile devices and a unique distributed architecture that provides protection from sophisticated online security threats.
NTRU is asymmetric cryptography that is based on a completely different mathematical problem from RSA and Elliptic Curve cryptography (ECC).
The VDTLS protocol extends the Internet standard protocol DTLS and integrates a recent development in asymmetric cryptography, called Identity Based Encryption (IBE), to effectively address the unique challenges in providing secure communications in vehicle networks.
Full browser ?