This page (revision-2) was last changed on 29-Nov-2024 16:16 by -jim

This page was created on 29-Nov-2024 16:16 by unknown

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note
2 29-Nov-2024 16:16 1 KB -jim to previous
1 29-Nov-2024 16:16 822 bytes unknown to last

Page References

Incoming links Outgoing links
Public Key

Version management

Difference between version and

At line 2 changed one line
A [{$pagename}] and [Private Key] are [Cryptographic Keys] that are [Cryptographically|Cryptographic] (mathematically) linked.
A [{$pagename}] and [Private Key] are [Cryptographic Keys] that are [Cryptographically|Cryptographic] (mathematically) linked.[{$pagename}] and [Private Key] together form a Public-Private [Key pair][{$pagename}] need not be protected and SHOULD be expected to be available to [Everybody].
At line 4 added 5 lines
%%information
[{$applicationname}] specifically addresses [RSA Cryptography] on this page even though there are other [Algorithms] which are similar in usage.
%%The [{$pagename}] is used to:
* [Encryption] of a [message] which can __only be__ [decrypted|Decryption] only by the [Private Key]
* perform [Signature Verification] of a [digital signature] which was signed by the [Private Key]. The two keys are used in [Asymmetric Key Cryptography] stems from the use of different keys to perform these opposite functions, each the inverse of the other.
At line 5 removed 8 lines
[{$pagename}] and [Private Key] together form a Public-Private [Key pair]
The [{$pagename}] is used to decrypt ciphertext or to create a digital signature.
The [Private Key] is used to encrypt plaintext or to verify a digital signature
The two keys are used in [Asymmetric Key Cryptography] stems from the use of different keys to perform these opposite functions, each the inverse of the other.