internet.com
You are in the: Small Business Computing Channelarrow View Sites +
Small Business Technology
» ECommerce-Guide | Small Business Computing | Webopedia | WinPlanet |  »Close
Webopedia.com
Enter a word for a definition... ...or choose a computer category.
 
 

menu
   Home
   Term of the Day
   New Terms
   Pronunciation
   New Links
   Quick Reference
   Did You Know?
   Categories
   Tech Support
   Webopedia Jobs
   About Us
   Link to Us
   Advertising
  

talk to us
   Submit a URL
   Suggest a Term
   Report an Error

internet.com
Developer
International
Internet Lists
Internet News
Internet Resources
IT
Linux/Open Source
Personal Technology
Small Business
Windows Technology
xSP Resources
Search internet.com
Advertise
Corporate Info
Newsletters
Tech Jobs
E-mail Offers
commerce
  Be a Commerce Partner
 
 
 
 
 
 
 
 
 
 
 
 
 
 

public-key encryption
Last modified: Thursday, October 09, 2003 

A cryptographic system that uses two keys -- a public key known to everyone and a private or secret key known only to the recipient of the message. When John wants to send a secure message to Jane, he uses Jane's public key to encrypt the message. Jane then uses her private key to decrypt it.

An important element to the public key system is that the public and private keys are related in such a way that only the public key can be used to encrypt messages and only the corresponding private key can be used to decrypt them. Moreover, it is virtually impossible to deduce the private key if you know the public key.

Public-key systems, such as Pretty Good Privacy (PGP), are becoming popular for transmitting information via the Internet. They are extremely secure and relatively simple to use. The only difficulty with public-key systems is that you need to know the recipient's public key to encrypt a message for him or her. What's needed, therefore, is a global registry of public keys, which is one of the promises of the new LDAP technology.

Public key cryptography was invented in 1976 by Whitfield Diffie and Martin Hellman. For this reason, it is sometime called Diffie-Hellman encryption. It is also called asymmetric encryption because it uses two keys instead of one key (symmetric encryption).

E-mail this definition to a colleague

Sponsored listings

Secure IM Management - Experience comprehensive IM management and security. Prevent IM worms and viruses. InfoWorld 2005 Technology of the Year Award Winner. Free trial.

All ID Systems: Key Cards - Low price guarantee on top brands. Free shipping. Find the right ID system at the right price. Emergency service and product training.

Symantec: Virus Security and Removal - Stop Zotob Virus now. Visit Symantec for updated information and resources.


For internet.com pages about public-key encryption . Also check out the following links!

Related Links

Cryptography for encryption, digital signatures and authentication 
Contains links to information on cryptography, a tutorial on public key encryption for secrecy and a discussion of the debate regarding government control of cryptography.

NIST computer security resource clearinghouse 
National Institute of Standards and Technology's computer security resource clearinghouse. It contains information on numerous security topics, as well as alerts about viruses and other security threats.

PGP introduction
This site explains how PGP software works through the use of a public and private key pairs.

Public-key cryptology FAQ
USENET FAQ that focuses on public-key cryptology.

Sponsored listings

VeriSign: SSL Certificates - Protect your site with the strongest security possible and it will help increase customers' trust in your e-business. Learn more about VeriSign SSL.

Digi-Key: Digi-Key Enclosures - Broad-line distributor web site features real-time stock status and pricing, online ordering, RFQ, technical support, product datasheets and photos.

Zebra Printers: Key Card Printing - Secure your business with Zebra's innovative and reliable card printers. Access control and ID card printing solutions.

Maglocks: Access Control System - Offers access control systems with digital keypads and electronic locks. Includes integrated key card systems.

KnowledgeStorm: Public Key Infrastructure (PKI) Services - Business technology search site offering software, service, reseller and hardware information on thousands of IT solutions.

related categories

Digital Rights Management (DRM)

Encryption

related terms

certification authority

cryptography

digital certificate

digital envelope

EFS

encryption

LDAP

Pretty Good Privacy

RSA

S/MIME

symmetric-key cryptography


webopedia
Give Us Your
Feedback


Books
public key cryptography Products


Shop by Top Models:
Beginning Cryptography With Java
5 store offers from $22 - $102

Internet Security: Cryptographic Principles, Algorithms and Protocols
4 store offers from $65 - $244

Rsa and Public-Key Cryptography
4 store offers from $43 - $91

Cryptography for Internet and Database Applications: Developing Secret and Public Key Techniques With Java
3 store offers from $9 - $40

Public Key Cryptography - Pkc 2004: 7th International Workshop on Practice and Theory in Public Key Cryptography, Singapore, March 1-4, 2004 Proceedings
3 store offers from $71 - $88435



JupiterWeb networks:

internet.comearthweb.comDevx.com graphics.com

Search JupiterWeb:

Jupitermedia Corporation has two divisions:
Jupiterimages andJupiterWeb


Legal Notices, Licensing, Reprints, & Permissions, Privacy Policy.

Jupitermedia Corporate Info | Newsletters | Tech Jobs | Shopping | E-mail Offers