Public Key

Public Key Crypto Pair Key Creation


A public key is a key used in the public cryptographic system.

The public key is often saved in a cer format.


The public key distribution can be done:

  • through public key servers. When a person creates a key-pair, they keep one key private and the other, known as the public-key, is uploaded to a server where it can be accessed by anyone to send the user a private, encrypted, message.
  • by publishing it in a public directory such as with a certification authority.
  • through an algorithm: See for instance: Diffie–Hellman key exchange and rsa

I judged it most important for military use … if you can share your key rapidly and electronically, you have a major advantage over your opponent.


A public key is created from a private key.

Example: create a rsa public key from a rsa private key

openssl rsa -in key.pem -pubout -out pubkey.pem

See also: Keypair (public and a private key)




server: SSH - Authorized Keys file (on Server)

Discover More
Card Puncher Data Processing
Cryptography - CER file format (Certificate)

.CER files are PEM file with the cer extension to indicate that they hold a certificate. They have the public key, they don't have the private key in a Public Key Cryptography model The format is defined...
Card Puncher Data Processing
Cryptography - Key

A key is a parameter used in a cipher algorithm that determines the encryption operation (forward) and the decryption operation (backward). It's the only secret parameter that protect the anonymity...
Portecle New Keystore
Cryptography - Keystore (KS)

A keystore is a database of key material. ie: key LDAP identity You only need it: if you are a server that want to implements SSL, or if the server requires client authentication. A keystore...
Card Puncher Data Processing
Cryptography - SSH

in the context of cryptography. For authentication: Public Key on the server: Add it to the ~/.ssh/authorized_keys file Private Key on the client: Configure PuTTY to use your private key file...
Card Puncher Data Processing
Cryptography Software - gpg (GNU Privacy Guard)

gpg (GNU Privacy Guard, GPG or GnuPG) is a cryptographic software of the pgp class that permits to: sign and encrypt easily another sort of message or file. GnuPGGPGGNU Privacy GuardOpenPGPPGP ...
Dkim Entry
Email - DomainKeys Identified Mail (DKIM) - Mail Signatures

DomainKeys Identified Mail (DKIM) is a method to sign digitally outgoing email, thereby allowing a person, role, or organization to claim some responsibility for the message. The signature will associate...
Dkim Record Text Format Ovh Dns Zone
How to configure DKIM with PostFix, a step by step guide

This article will show and explain you how to install DKIM with OpenDkim as a milter for Postix on CentOS
Web Site Certificate
How to enable SSL on a server (ie HTTPS on a web server) ?

This page shows you how to configure a certificate and a private key for a server in order to enable SSL or a web server (http) (ie web site) in order to enable https (ie HTTP over SSL).
Certificate Validity Period Not Before Not After Portecle
Identification Material - Certificate (or Public Key Certificate)

A certificate is a document which permits to define with certainty the owner of the private key (ensures that the party you are communicating with is whom you think.) because it's digitally signed A certificate...
Public Key Crypto Pair Key Creation
Keypair (public and a private key)

A keypair is a pair of keys: a public key: Used for encryption or signature verification; and a private one: The decryption key which is kept secret decrypt and sign. They are a component of the...

Share this page:
Follow us:
Task Runner