Public key encryption: Difference between revisions
From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson m (Spacing and italic last sentence 20/8/13) |
imported>Doug Williamson (Add link.) |
||
(4 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
''Cybersecurity.'' | |||
Public key encryption, uses a pair of keys, one public, one private, to send encrypted messages. | Public key encryption, uses a pair of keys, one public, one private, to send encrypted messages. | ||
Line 5: | Line 7: | ||
Public key encryption is used when there are multiple senders and receivers of messages to provide authentication and confidentiality of the message and to prevent repudiation. | Public key encryption is used when there are multiple senders and receivers of messages to provide authentication and confidentiality of the message and to prevent repudiation. | ||
Also known as ''Asymmetric encryption.'' | |||
== See also == | == See also == | ||
* [[Cybersecurity]] | |||
* [[Dual key]] | |||
* [[Encryption]] | * [[Encryption]] | ||
* [[Key]] | |||
* [[Private key]] | |||
* [[Public]] | |||
* [[Public key ]] | |||
* [[Public key infrastructure]] | |||
* [[Quantum computing]] | |||
* [[RSA encryption]] | |||
[[Category:Manage_risks]] | |||
[[Category:Technology]] | [[Category:Technology]] |
Latest revision as of 07:38, 22 June 2023
Cybersecurity.
Public key encryption, uses a pair of keys, one public, one private, to send encrypted messages.
The keys work in a complementary manner so that information encrypted by one key can be decrypted by the other.
Public key encryption is used when there are multiple senders and receivers of messages to provide authentication and confidentiality of the message and to prevent repudiation.
Also known as Asymmetric encryption.