Public key encryption and Quantitative techniques: Difference between pages

From ACT Wiki
(Difference between pages)
Jump to navigationJump to search
imported>Doug Williamson
(Add links.)
 
imported>Doug Williamson
(Link with Sensitivity analysis page.)
 
Line 1: Line 1:
''Cybersecurity.''
Analysis with numbers and calculations.
 
Public key encryption, uses a pair of keys, one public, one private, to send encrypted messages. 
 
The keys work in a complementary manner so that information encrypted by one key can be decrypted by the other. 
 
Public key encryption is used when there are multiple senders and receivers of messages to provide authentication and confidentiality of the message and to prevent repudiation.
 
 
Also known as ''Asymmetric encryption.''




== See also ==
== See also ==
* [[Cybersecurity]]
* [[Financial analysis]]
* [[Dual key]]
* [[Qualitative techniques]]
* [[Encryption]]
* [[Quantitative easing]]
* [[Private key]]
* [[Sensitivity analysis]]
* [[Public]]
* [[Public key ]]
* [[Public key infrastructure]]
* [[Quantum computing]]
* [[RSA encryption]]
 
[[Category:Manage_risks]]
[[Category:Technology]]

Revision as of 11:09, 21 May 2017