A public key is a value provided by some designated authority as a key that, combined with a private key derived from the public key, can be used to effectively encrypt messages and generate digital signatures The use of combined public and private keys is known as asymmetric cryptography A system for using public keys is called a public key infrastructure (PKI)
The publically available key in a Public Key Cryptography system, used to encrypt messages bound for its owner and to verify signatures made by its owner
A unique electronic value made available to those who need to verify the authenticity of a document and/or an electronic signature The public key corresponds to a particular private key, and the public key is needed to decrypt information encrypted by the private key
A mathematical key that can be made publicly available and which is used to verify signatures created with its corresponding private key Depending on the algorithm, public keys are also used to encrypt messages or files which can then be decrypted with the corresponding private key (See also PUBLIC KEY CRYPTOGRAPHY; PRIVATE KEY)
A widely available mathematical key used for encrypting or decrypting messages The current electronic check demonstration projects use a combination of private and public keys to ensure the security and authenticity of data transmissions
An encryption system that uses two keys, so one key is kept private, and the other key can be publically distributed One key can be used to encrypt, but the other key is required to decrypt
A mathematical key that can be shared safely so that others can send you encrypted information that only your private key can unscramble The public key can also verify signatures created with its corresponding private key Depending on the algorithm, public keys are also used to encrypt messages or files that can then be decrypted with the corresponding private key
The publicly available component of an integrated asymmetric key pair often referred to as the encryption key, the encrypted product of which can only be decrypted using the matching private key The public key is stored in a public key certificate, which has been digitally signed by a certificate authority, verifying that the stored public key is indeed the authentic public key of the identified user
Key used in public key crypto that belongs to an individual entity and is distributed publicly Others can use the public key to encrypt data that only the key's owner can decrypt
A key used in asymmetric cryptography that belongs to an individual entity and is distributed publicly The public key is used to verify a digital signature created by the corresponding private key Others can use the public key to encrypt data that only the keys owner can decrypt
The part of a key pair that is widely distributed, and is not kept secure This is the key used for encryption (as opposed to decryption) or for verifying signatures
One of the two keys used in an asymmetric encryption system The public key is made public, to be used in conjunction with a corresponding private key [Stallings, 1995]
A Public Key is (1) the key of a signature key pair used to validate a digital signature or (2) the key of an encryption key pair used to encrypt confidential information In both cases, this key is made publicly available
a key in asymmetric ciphers used to encrypt a message that can only be decrypted by the matching private key Public keys can be openly shared because knowledge of the public key doesn't help quickly cryptanalyze a public key encrypted message or figure out the private key Although public keys don't need to be concealed they must nevertheless be protected (see man-in-the-middle attack)
The part of the key in a public key system which is distributed widely, and is not kept secure This is the key used for encryption (as opposed to decryption) or for verifying signatures Compare private key
The publicly available key in a Public Key Cryptography system, used to encrypt messages bound for its owner and to decrypt signatures made by its owner
The other half of a key pair, a public key is held in a digital certificate Public keys are usually published in a directory Any public key can encrypt information; however, data encrypted with a specific public key can only be decrypted by the corresponding private key, which the key owner keeps secret A public key can also be used to verify the authenticity of a digital signature
The publically available key in a Public Key Cryptography system, used to encrypt messages bound for its owner and to decrypt signatures made by its owner
A cryptographic key used with a public key cryptographic algorithm, uniquely associated with an entity, and which is available publicly It is used to verify signatures that were created with the matched private key Public keys are also used to encrypt messages or files that can only be decrypted using the matched private key You can freely distribute your public key to other people, allowing them to communicate with you securely