Public key encryption and Public key infrastructure: Difference between pages

From ACT Wiki
(Difference between pages)
Jump to navigationJump to search
imported>Doug Williamson
(Add link.)
 
imported>Doug Williamson
m (Spacing 20/8/13)
 
Line 1: Line 1:
''Cybersecurity.''
(PKI).  


Public key encryption, uses a pair of keys, one public, one private, to send encrypted messages. 
Public-key infrastructure uses one or more third parties, known as certificate authorities, to certify ownership of key pairs to prove that a public key is authentic, and has not been tampered with or replaced by a malicious third party.
 
The keys work in a complementary manner so that information encrypted by one key can be decrypted by the other. 
 
Public key encryption is used when there are multiple senders and receivers of messages to provide authentication and confidentiality of the message and to prevent repudiation.
 
 
Also known as ''Asymmetric encryption.''




== See also ==
== See also ==
* [[Cybersecurity]]
* [[Digital signature]]
* [[Dual key]]
* [[Secure Sockets Layer]]
* [[Encryption]]
* [[Key]]
* [[Private key]]
* [[Public]]
* [[Public key ]]
* [[Public key infrastructure]]
* [[Quantum computing]]
* [[RSA encryption]]


[[Category:Manage_risks]]
[[Category:Technology]]
[[Category:Technology]]

Revision as of 15:57, 20 August 2013

(PKI).

Public-key infrastructure uses one or more third parties, known as certificate authorities, to certify ownership of key pairs to prove that a public key is authentic, and has not been tampered with or replaced by a malicious third party.


See also