public key cryptography


Also found in: Dictionary, Thesaurus, Medical, Legal, Acronyms, Wikipedia.

public key cryptography

An encryption method that uses a two-part key: one private; the other public. To send an encrypted message to someone, the recipient's public key is used, which can be published anywhere or sent openly via e-mail. When the message arrives, the recipient uses his or her private key, which is always kept secret.

Public key cryptography differs from "secret key cryptography," which uses the same key to encrypt and decrypt. The advantage of public key cryptography is that the public key can be published anywhere and transmitted in the open. The secret key method requires that both sides use the same key, which obviously cannot be freely published. However, public key cryptography is often used to send the secret key to the receiving end and then exchange data via secret keys. See cryptography.

Digital Signatures Start With the Private Key
To create a digital signature that ensures the integrity of a message, document or other file, the signer's private key is used to encrypt the message digest. To verify the signature, the signer's public key is used to decrypt the signature back into the digest and compare it with a newly generated digest.

In the following example, the woman signs the message first and then entirely encrypts it before sending it. The man decrypts the message first and then verifies the signature. See digital signature.


References in periodicals archive ?
Providing a complete set of cryptographic operations needed to secure today's wireless data networks, the CGX Mobile Library is based on SafeNet's FIPS certified CGX Cryptographic Library, and provides essential security functions like initialization, random number generation, public key cryptography, hashing, and symmetric key encryption.
Building public key infrastructure that realizes the promise of public key cryptography has proved more difficult than anyone imagined when Marty Hellman and I came up with the idea of public key systems in the 1970s," said Dr.

Full browser ?