Diritto ed Informatica: Diritto Internet
English |
public key cryptography |
|
|
Definition |
Rather than sharing one secret key, this new design uses two mathematically related keys for each communicating party: a "public key" that is disclosed to the public, and a corresponding "private key" that is kept secret. A message that is encrypted with a public key can only be decrypted by the corresponding private key […] An important application for public key cryptography is "digital signature", which can be used to verify the integrity of data or the authenticity of the sender of data. In this case, the private key is used to "sign" a message, while the corresponding public key is used to verify a "signed" message.
|
Definition source |
(L)e-crypto-OECD
|
Context |
Public key cryptography offers the benefits of confidential transmissions and digital signature in an open network environment in which parties do not know one another in advance, and without the need to share secret key information. The Government believes this is vital for electronic commerce between trading partners who may, of course, not know each other.
|
Context source |
(L)ukdtipap-UK
|
Synonym |
asymmmetric cryptography, public-key encryption, public-key/asymmetric cryptosystem
|
Subject field |
Information Technology
|
Comprehensive concept |
encryption > symmetric encryption
|
Related concept |
private key, public key, RSA
|
it |
crittografia asimmetrica
|
Reliability code |
3
|
|