Difference between revisions of "Public Key Cryptography"

From wiki
Jump to navigation Jump to search
(Created page with "Category:Cryptograpy A method to encrypt messages by using asymmetric encryption. For this we need a key-pair, a private an a public key. Both keys are unique. Any privat...")
 
m
 
Line 4: Line 4:
 
For this we need a key-pair, a private an a public key. Both keys are unique. Any private key can have only 1 public key and any public key can only be derived from 1 private key. You can not derive the private key from the public key.
 
For this we need a key-pair, a private an a public key. Both keys are unique. Any private key can have only 1 public key and any public key can only be derived from 1 private key. You can not derive the private key from the public key.
  
A private key uniquely identifies an entity (person or computer) it should be kept private by that entity. Public keys can be shared in public enabling these use cases:
+
A private key uniquely identifies an entity (person or computer), it should be kept private by that entity. Public keys can be shared in public enabling these use cases:
 
* Messages encrypted with the public key can only be decoded using the private key.
 
* Messages encrypted with the public key can only be decoded using the private key.
* Messages signed with the private key can only be decoded using the public key. A message signed with a private key can only be created by the owner of the private key.
+
* Messages signed with the private key can only be decoded using the public key. A message signed with a private key can only be created by the owner of that private key.

Latest revision as of 15:44, 25 May 2021

A method to encrypt messages by using asymmetric encryption.

For this we need a key-pair, a private an a public key. Both keys are unique. Any private key can have only 1 public key and any public key can only be derived from 1 private key. You can not derive the private key from the public key.

A private key uniquely identifies an entity (person or computer), it should be kept private by that entity. Public keys can be shared in public enabling these use cases:

  • Messages encrypted with the public key can only be decoded using the private key.
  • Messages signed with the private key can only be decoded using the public key. A message signed with a private key can only be created by the owner of that private key.