Overview#
Private Key or Secret-key and A Public Key are Cryptographic Keys that are mathematically linked.The Private Key may be used to:
- decrypt ciphertext which was Encrypted by the Public Key
- create a Digital Signature which could be Verified by anyone with the Public Key
- Encrypt a message which could be read by anyone with the Public Key (which should be considered everyone)
Protection and safeguarding of the Private Key must be performed as the Private Key is essentially a Bearer Token.
The two keys are used in Asymmetric Key Cryptography stems from the use of different keys to perform these opposite functions, each the inverse of the other.
Asymmetric Key Cryptography as contrasted Symmetric Key Cryptography which relies on the same Private Key or Secret-key to perform both operations.
Public Key Infrastructure Weaknesses#
If the Private Key is not properly safeguarded by the original owner, digital forgery can become a major concern as the Private Key is considered to be a Bearer Token.More Information#
There might be more information for this subject on one of the following:- 2.16.840.1.113719.1.1.4.1.82
- Asymmetric Key
- Asymmetric Key Cryptography
- Asymmetric Key Packages
- Asymmetric cipher
- Authentication
- AuthorityKeyIdentifier
- BEAST
- Binding
- Bitcoin address
- Blockchain
- Blockchain Identity
- CTAP2
- Certificate
- Certificate Authority
- Certificate Formats
- Certificate Revocation
- Certificate Signing Request
- CertificateVerify
- Cipher
- Client To Authenticator Protocol
- ClientKeyExchange
- Credential Management
- Credential Recovery
- Cryptocurrency wallet
- Cryptographic Key
- Custodial Wallet
- DID Document
- Digital Signature Algorithm
- Distinguished Encoding Rules
- Domain Validated Certificate
- DomainKeys Identified Mail
- EMV Terms
- ES256
- Elliptic Curve
- Elliptic Curve Diffie-Hellman
- Ephemeral Key
- FIDO
- FIDO Authenticator
- FIDO Client
- FIDO Standards
- FIPS 186
- Fast IDentity Online
- Fully Hashed Menezes-Qu-Vanstone
- Hardware Security Module
- How SSL-TLS Works
- Hybrid cryptosystem
- Identity Custodian
- JLINC
- JSON Web Tokens
- JWK
- Java KeyStore
- Key Generation
- Key Life cycle
- Key Recovery
- Key pair
- Key wrapping
- Key-Exchange
- KeyEncipherment
- Keyed-Hash Message Authentication Code
- Keystore
- LOA 3
- M-04-04 Level of Assurance (LOA)
- Mutual TLS
- Mutual TLS Profiles for OAuth Clients
- NCP Primary Authentication Protocol
- NDS Authentication
- NICI
- NICI Configuration Files
- Non-Repudiation
- OAuth 2.0 Demonstration of Proof-of-Possession at the Application Layer
- Off-the-Record Messaging
- OpenID Connect Federation
- PKCS 1
- PKCS 9
- PKCS12
- PKCS7
- Password Flow From Active Directory to eDirectory
- Password-authenticated Key Exchange
- Perfect Forward Secrecy
- Primary Refresh Token
- Privacy-Enhanced Mail
- Private Key
- PseudoServer
- Public Key
- Public Key Cryptography
- Public Key Infrastructure Weaknesses
- Public-Key Cryptography Standards
- RS256
- RSA Cryptography
- RSA Public Key
- RSA key-exchange
- Rich Credential
- SASService
- SDI Key
- Secret-key
- Security Domain Infrastructure
- Self-signed Certificate
- Service Account
- Signature Generation
- Signature Verification
- Ten Principles of Self-Sovereign Identity
- Token Binding Protocol
- U-Prove
- Universal Second Factor
- Verifying Certificate Signatures
- W3C Decentralized Identifiers
- Yubico