asymmetric cryptography


Also found in: Dictionary, Medical, Financial, Wikipedia.

asymmetric cryptography

A very popular encryption method that uses two keys. When a message is sent to the only person entitled to view it, the recipient's public key is used by the sender to encrypt, and the recipient's secret key is used to decrypt.

With digital signatures, the sender's private key is used to encrypt a digest of the message, and the sender's public key is used to decrypt. See public key cryptography, digital signature and RSA.
References in periodicals archive ?
A digital signature relies on the mathematically complex world of asymmetric cryptography.
The company's unique combination of advanced asymmetric cryptography, the ubiquity of mobile devices and a unique distributed architecture provide protection from sophisticated online security threats.
Ensuring the true authentication of senders through the use of asymmetric cryptography (the "who")
According to WiKID CEO, Nick Owen, "The WiKID system lowers the total cost of ownership of an advanced authentication system by employing asymmetric cryptography, thereby eliminating the need for single-use devices.
The OneID service is based on a unique combination of advanced asymmetric cryptography, the ubiquity of mobile devices and a unique distributed architecture that provides protection from sophisticated online security threats.
Full browser ?