Cryptography - Public Key Encryption

Public Key Crypto Pair Key Creation

About

Public Key Encryption (PKE) is the encryption method of the public key cryptography that ensure that a communication is kept confidential (secrecy) during transit.

Scheme

Public Key Encrypt

Public Key encryption procedure:

  • the recipient's public key encrypts the message (the sender of the message do it and he cannot decrypt the encrypted message)
  • the encrypted message is transmitted electronically to the receiver.
  • the recipient's private key decrypts the message (the receiver do it. Only the person who holds the matching private key can read the message).

An analogy to public key encryption is that of a locked mail box..

  • The public key is the mail slot. Anyone knowing the street address can go to the door and drop a written message.
  • The private key is the key. Only the person who possesses the key can open the mailbox and read the message.

A keypair is often used to exchange an on-the-fly symmetric key, which will only be used for the current session.





Discover More
Cryptography - Encryption (Enciphering)

Encryption is the function of a cipher that transforms usable data into an unreadable form. It provides confidentiality if a secret is used in the encryption. There is two class of encryption. ...
Public Key Crypto Pair Key Creation
Enveloped Public Key Encryption (EPKE)

is a encryption method of the public key schema. EPKE is the method used when securing communication on an open networked environment such by making use of the Transport Layer Security (TLS) (ie SSL)...
Gmail Tls Security
Postfix - TLS (SSL) configuration

Transport Layer Security (TLS, formerly called SSL) with Postfix It provides: certificate-based authentication and encrypted sessions. An encrypted session protects the information that is transmitted:...
What is a Public Key Cryptography (known as Asymmetric Cipher) ?

(Public Key Cryptography|Asymmetric Cipher) Public key cryptography is a cryptographic system from the 70's that uses pairs of keys It's also known as: * asymmetric cryptography) * non-secret...



Share this page:
Follow us:
Task Runner