public key cryptography

Also found in: Dictionary, Thesaurus, Medical, Legal, Financial, Acronyms, Wikipedia.

public key cryptography

An encryption method that uses a two-part key: one private; the other public. To send an encrypted message to someone, the recipient's public key is used, which can be published anywhere or sent openly via email. When the message arrives, the recipient uses his or her private key, which is always kept secret.

Public key cryptography differs from "secret-key cryptography," which uses the same key to encrypt and decrypt. The advantage of public key cryptography is that the public key can be published anywhere and transmitted in the open. The secret key method requires that both sides use the same key, which obviously cannot be freely published. However, public key cryptography is often used to send the secret key to the receiving end and then exchange data via secret keys. See cryptography.

Digital Signatures Start With the Private Key
To create a digital signature that ensures the integrity of a message, document or other file, the signer's private key is used to encrypt the message digest. To verify the signature, the signer's public key is used to decrypt the signature back into the digest and compare it with a newly generated digest.

In the following example, the woman signs the message first and then entirely encrypts it before sending it. The man decrypts the message first and then verifies the signature. See digital signature.

Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
of Public Key Cryptography - PKC 2012 -15th International Conference on Practice and Theory in Public Key Cryptography,Darmstadt, Germany, pp.
While it is possible to create similar schemes using symmetric cryptography and traditional public key cryptography, pairing-based approaches require less complicated key management practices.
Wang, "Lattice-based group signature scheme with verifier-local revocation," in Public Key Cryptography: PKC 2014, pp.
Encryption systems comprise two general categories: (1) private key cryptography and (2) public key cryptography. There is also biometric verification, which will use an iris scan to cheek a user's eye, like a fingerprint.
Certicom's solutions incorporate its efficient encryption technology and are based on industry standards for information security that utilize public key cryptography. Certicom's products are currently licensed to more than 300 customers including Cisco Systems, Inc., Handspring Inc., Motorola, Inc., Nortel Networks, Openwave Systems, Inc., Palm, Inc., QUALCOMM, Inc., Research In Motion Ltd., Sony International (Europe) GmbH and Verizon Communications Inc.
MultiPrime, a patented technology from Compaq that increases the performance of public key cryptography on both server and client platforms, provides wireless and embedded device manufacturers with breakthrough technology, enabling high-speed performance and enhanced security on small footprint devices such as personal digital assistants (PDAs), mobile phones, and pagers.
It uses public key cryptography to secure messages from web browsers (clients) to Internet transaction servers (e.g.,
Security features are reported as including an enhanced, on-chip, hardware firewall (providing separation and integrity of data and applications), a 32-bit FameX public key cryptography co- processor, a high-speed triple DES co-processor and a true random number generator.
Public key cryptography is the use of an algorithm featuring two different but mathematically related keys.
Public key infrastructure is a system that enables organisations to automate the encryption and decryption of electronic documents, using public key cryptography. A typical PKI implementation is comprised of certification authority (CA) and registration authority (RA) servers, directories, applications, and digital certificates, that all run on specific protocols and standards.
Connections are securely authenticated with passwords and public key cryptography, the policy database authorizes access to network resources determined by the administrator, and network links are encrypted point-to-point.
When sending a message over an open network, such as the Internet, public key cryptography can ensure confidentiality of the message.

Full browser ?