Alma Mater Studiorum - Forlì


Home page
Le collezioni
La scuola
Il progetto
I collaboratori
Gli sponsor
Il laboratorio
Regole e normative
Per contattarci
Copyright


login
password
ho dimenticato la password
mi voglio iscrivere

ceci n'est pas une pomme
 
previous public key cryptography - collezione «Diritto ed Informatica: Diritto Internet» - Annalisa Storto next
Cerca   nella collezione  

Diritto ed Informatica: Diritto Internet

English
public key cryptography clicca per ingrandire
Definition Rather than sharing one secret key, this new design uses two mathematically related keys for each communicating party: a "public key" that is disclosed to the public, and a corresponding "private key" that is kept secret. A message that is encrypted with a public key can only be decrypted by the corresponding private key […] An important application for public key cryptography is "digital signature", which can be used to verify the integrity of data or the authenticity of the sender of data. In this case, the private key is used to "sign" a message, while the corresponding public key is used to verify a "signed" message.
Definition source (L)e-crypto-OECD
Context Public key cryptography offers the benefits of confidential transmissions and digital signature in an open network environment in which parties do not know one another in advance, and without the need to share secret key information. The Government believes this is vital for electronic commerce between trading partners who may, of course, not know each other.
Context source (L)ukdtipap-UK
Synonym asymmmetric cryptography, public-key encryption, public-key/asymmetric cryptosystem
Subject field Information Technology
Comprehensive concept encryption > symmetric encryption
Related concept private key, public key, RSA
it crittografia asimmetrica
Reliability code 3



SSLMIT - Scuola Superiore di Lingue Moderne per Interpreti e Traduttori  &  MIT - Management Innovative Tools S.p.A. - Powered by : Powered by DynaMIT