Public key encryption: Difference between revisions

From ACT Wiki
Jump to navigationJump to search
imported>Administrator
(CSV import)
 
imported>Charles Cresswell
No edit summary
Line 6: Line 6:
== See also ==
== See also ==
* [[Encryption]]
* [[Encryption]]


[[Category:Technology_and_Systems]]

Revision as of 21:15, 28 June 2013

Public key encryption, uses a pair of keys, one public, one private, to send encrypted messages. The keys work in a complementary manner so that information encrypted by one key can be decrypted by the other. Public key encryption is used when there are multiple senders and receivers of messages to provide authentication and confidentiality of the message and to prevent repudiation.

Also known as Asymmetric encryption.

See also