public key cryptography

Also found in: Dictionary, Thesaurus, Medical, Legal, Acronyms, Wikipedia.

public key cryptography

An encryption method that uses a two-part key: a public key and a private key. To send an encrypted message to someone, you use the recipient's public key, which can be sent to you via regular e-mail or made available on any public website or venue. To decrypt the message, the recipient uses the private key, which he or she keeps secret. Contrast with "secret key cryptography," which uses the same key to encrypt and decrypt.

The advantage of public key cryptography over secret key cryptography is that the public key can be published anywhere. In secret key, both sides must use the same key, which obviously cannot be freely published. However, public key cryptography is often used to send the secret key to the receiving end. See cryptography.

Digital Signatures Reverse the Procedure
To create a digital signature that ensures the integrity of a message, document or other file, the keys are used in reverse. The private key is used to sign the file (encrypt the digest), and the public key is used to verify it (decrypt the digest).

Public Key Methods Used in Combination
The private key of the sender is used to sign the message, and the public key of the recipient is used to encrypt the signature and the message. For more details, see digital signature.
References in periodicals archive ?
Providing a complete set of cryptographic operations needed to secure today's wireless data networks, the CGX Mobile Library is based on SafeNet's FIPS certified CGX Cryptographic Library, and provides essential security functions like initialization, random number generation, public key cryptography, hashing, and symmetric key encryption.
Building public key infrastructure that realizes the promise of public key cryptography has proved more difficult than anyone imagined when Marty Hellman and I came up with the idea of public key systems in the 1970s," said Dr.

Full browser ?