Difference between revisions of "Public key encryption"

From ACT Wiki
Jump to: navigation, search
(Add header.)
(Layout.)
 
Line 7: Line 7:
 
Public key encryption is used when there are multiple senders and receivers of messages to provide authentication and confidentiality of the message and to prevent repudiation.
 
Public key encryption is used when there are multiple senders and receivers of messages to provide authentication and confidentiality of the message and to prevent repudiation.
  
''Also known as Asymmetric encryption.''
+
 
 +
Also known as ''Asymmetric encryption.''
  
  
Line 14: Line 15:
 
* [[Dual key]]
 
* [[Dual key]]
 
* [[Encryption]]
 
* [[Encryption]]
 +
* [[Quantum computing]]
 +
* [[RSA encryption]]
  
 
[[Category:Manage_risks]]
 
[[Category:Manage_risks]]
 
[[Category:Technology]]
 
[[Category:Technology]]

Latest revision as of 12:17, 18 December 2019

Cybersecurity.

Public key encryption, uses a pair of keys, one public, one private, to send encrypted messages.

The keys work in a complementary manner so that information encrypted by one key can be decrypted by the other.

Public key encryption is used when there are multiple senders and receivers of messages to provide authentication and confidentiality of the message and to prevent repudiation.


Also known as Asymmetric encryption.


See also