public key - Glossary | CSRC (2024)

Definitions:

The public part of an asymmetric key pair that is typically used to verify signatures or encrypt data.
Sources:
FIPS 201-3 under Public Key
NIST SP 1800-12b

A cryptographic key that is used with an asymmetric (public key) cryptographic algorithm and is associated with a private key. The public key is associated with an owner and may be made public. In the case of digital signatures, the public key is used to verify a digital signature that was generated using the corresponding private key.
Sources:
FIPS 186-5 under Public key

A cryptographic key that is used with an asymmetric (public-key) cryptographic algorithm and is associated with a private key. The public key is associated with an owner and may be made public. In the case of digital signatures, the public key is used to verify a digital signature that was generated using the corresponding private key.
Sources:
FIPS 204
FIPS 205 from FIPS 186-5

A mathematical key that has public availability and that applications use to verify signatures created with its corresponding private key. Depending on the algorithm, public keys can encrypt messages or files that the corresponding private key can decrypt.
Sources:
CNSSI 4009-2015 from CNSSI 1300

A cryptographic key used with a public key cryptographic algorithm that is uniquely associated with an entity and that may be made public.
Sources:
NIST SP 800-12 Rev. 1 under Public Key from FIPS 140-2

A cryptographic key used by a public-key (asymmetric) cryptographic algorithm that may be made public.
Sources:
NIST SP 800-152 under Public key

A cryptographic key that may be made public and is used with a public-key cryptographic algorithm. A public key is associated with a private key.
Sources:
NIST SP 800-56B Rev. 2 under Public key

The public part of an asymmetric key pair that is used to verify signatures or encrypt data.
Sources:
NIST SP 1800-16B under Public Key from NIST SP 800-63-3
NIST SP 1800-16C under Public Key from NIST SP 800-63-3
NIST SP 1800-16D under Public Key from NIST SP 800-63-3
NIST SP 1800-17b under Public Key
NIST SP 1800-17c under Public Key
NIST SP 800-63-3 under Public Key

A cryptographic key that is used with an asymmetric (public key) cryptographic algorithm and is associated with a private key. The public key is associated with an owner and may be made public. In the case of digital signatures, the public key is used to verify a digital signature that was signed by the corresponding private key.
Sources:
NIST SP 800-89 under Public key

A cryptographic key used with a public-key cryptographic algorithm that is uniquely associated with an entity and that may be made public. The public key has a corresponding private key. The public key may be known by anyone and, depending on the algorithm, may be used: 1. To verify a digital signature that is signed by the corresponding private key, 2. To encrypt keys that can be decrypted using corresponsing private key, or 3. As on of the input values to compute a shared secret during a key agreement transaction.
Sources:
NIST SP 800-57 Part 2 Rev.1 under Public key

A cryptographic key used with a public-key (asymmetric-key) algorithm that is uniquely associated with an entity and that may be made public. In an asymmetric (public) key cryptosystem, the public key is associated with a private key. The public key may be known by anyone and, depending on the algorithm, may be used to 1. Verify a digital signature that is signed by the corresponding private key, 2. Encrypt data that can be decrypted by the corresponding private key, or 3. Compute a shared secret during a key-agreement process.
Sources:
NIST SP 800-175B Rev. 1 under Public key

A cryptographic key used with a public-key cryptographic algorithm that is uniquely associated with an entity and that may be made public. In an asymmetric-key (public-key) cryptosystem, the public key has a corresponding private key. The public key may be known by anyone and, depending on the algorithm, may be used, for example, to: 1. Verify a digital signature that was generated using the corresponding private key, 2. Encrypt keys that can be decrypted using the corresponding private key, or 3. Compute a shared secret during a key-agreement transaction.
Sources:
NIST SP 800-57 Part 1 Rev. 5 under Public key

A cryptographic key used with an asymmetric-key (public-key) cryptographic algorithm that may be made public and is associated with a private key and an entity that is authorized to use that private key. Depending on the algorithm that employs the public key, it may be used to:1. Verify a digital signature that is signed by the corresponding private key;2. Encrypt data that can be decrypted by the corresponding private key; or3. Compute a piece of shared data (i.e., data that is known only by two or more specific entities).
Sources:
NIST SP 800-133 Rev. 2 under Public key

public key - Glossary | CSRC (2024)

FAQs

Why is public key encryption hard to crack? ›

Key pairs are generated with cryptographic algorithms based on mathematical problems termed one-way functions. Security of public-key cryptography depends on keeping the private key secret; the public key can be openly distributed without compromising security.

What are the 5 steps to public key encryption? ›

Public key encryption involves five steps: key generation, key exchange, encryption, sending encrypted data, and decryption.

Is public key encryption safe? ›

Secure Communication: Public key encryption ensures that sensitive communication between two parties remains secure, even if intercepted by hackers. The public key is used to encrypt the message, and the recipient's private key is used for decryption. This ensures that only the intended recipient can read the message.

What is the public key secret? ›

A message gets encrypted by a public key, which is available to everyone, and can only be decrypted with its unique private key,which is only available to its owner. Public keys have been described by some as being like a business' physical address – it's public and anyone can look it up and share it widely.

What is the hardest cryptography to crack? ›

AES 256-bit encryption is the strongest and most robust encryption standard that is commercially available today. While it is theoretically true that AES 256-bit encryption is harder to crack than AES 128-bit encryption, AES 128-bit encryption has never been cracked.

What is the hardest to crack encryption? ›

AES-256 encryption is virtually uncrackable using any brute-force method. It would take millions of years to break it using the current computing technology and capabilities.

Can a public key be intercepted? ›

Public key encryption is also called asymmetric encryption, because the same key cannot be used to encrypt and decrypt the message. Instead, one key of a pair is used to undo the work of the other. With symmetric key encryption, beware of stolen or intercepted keys.

How to decrypt public key? ›

Data encrypted with the public key can only be decrypted with the private key. Because of this use of two keys instead of one, public key cryptography is also known as asymmetric cryptography.

What is the most common public key encryption? ›

The most commonly used public-key cryptosystem is RSA, which is named after its three developers Ron Rivest (b. 1947), Adi Shamir, and Leonard Adleman (b. 1945). At the time of the algorithm's development (1977), the three were researchers at the MIT Laboratory for Computer Science.

Can a private key have multiple public keys? ›

It's actually possible to generate several public keys from the same private key. However, you'll only ever have one private key. And while it's theoretically possible to guess or calculate the public key from the private key, the reverse would take hundreds of years to crack.

Can a public key be exposed? ›

Public: As the name implies, this type of key is widely available for anyone to see. Private: This form of key is closely guarded and protected. Only you should know about it.

How to generate a public key? ›

To generate an SSH private/public key pair for your use, you can use the ssh-keygen command-line utility. You can run the ssh-keygen command from the command line to generate an SSH private/public key pair. If you are using Windows, by default you may not have access to the ssh-keygen command.

Where are public keys stored? ›

The public key is used by both the user and the remote server to encrypt messages. On the remote server side, it is saved in a public key file. On the user's side, it is stored in SSH key management software or in a file on their computer.

What is a public key example? ›

Assume that Bob wants to send a secret message to Alice using public-key cryptography. Alice has both a public key and a private key, so she keeps her private key in a safe place and sends her public key to Bob. Bob encrypts the secret message to Alice using Alice's public key.

Can you crack a public key? ›

The public key is used to encrypt plaintext or to verify a digital signature; whereas the private key is used to decrypt ciphertext or to create a digital signature. Hopefully, this helps answer your question about “public” key being broken as Security-general-l states, no one breaks a public key.

What is the problem with public key encryption? ›

If user private key used for certificate creation higher in the PKI (Public Key Infrastructure) server hierarchy is compromised, or accidentally disclosed, then a “man-in-the-middle attack” is also possible, making any subordinate certificate wholly insecure. This is also the weakness of public key Encryption.

Why is public key encryption inefficient for long messages? ›

It's a slow process compared to symmetric cryptography. It's, therefore, not appropriate for decrypting bulk messages. If an individual loses their private key, they can't decrypt the messages they receive. Because public keys aren't authenticated, no one can ensure a public key belongs to the person specified.

Is it possible to decrypt with a public key? ›

Public key cryptography is a method of encrypting or signing data with two different keys and making one of the keys, the public key, available for anyone to use. The other key is known as the private key. Data encrypted with the public key can only be decrypted with the private key.

Top Articles
How to Use TIPS in Your Portfolio
NEO VS Ethereum: Could NEO Be the Next Big Thing After Ethereum?
Dlnet Retiree Login
Pinellas County Jail Mugshots 2023
Lamb Funeral Home Obituaries Columbus Ga
80 For Brady Showtimes Near Marcus Point Cinema
Jonathon Kinchen Net Worth
10 Popular Hair Growth Products Made With Dermatologist-Approved Ingredients to Shop at Amazon
DL1678 (DAL1678) Delta Historial y rastreo de vuelos - FlightAware
Poplar | Genus, Description, Major Species, & Facts
Irving Hac
Progressbook Brunswick
Best Pawn Shops Near Me
Programmieren (kinder)leicht gemacht – mit Scratch! - fobizz
Dumb Money
6th gen chevy camaro forumCamaro ZL1 Z28 SS LT Camaro forums, news, blog, reviews, wallpapers, pricing – Camaro5.com
Dutchess Cleaners Boardman Ohio
Jc Post News
Luna Lola: The Moon Wolf book by Park Kara
Operation Cleanup Schedule Fresno Ca
Kitty Piggy Ssbbw
Niche Crime Rate
Jbf Wichita Falls
Providence Medical Group-West Hills Primary Care
Yosemite Sam Hood Ornament
Talk To Me Showtimes Near Marcus Valley Grand Cinema
Happy Homebodies Breakup
Cona Physical Therapy
Waters Funeral Home Vandalia Obituaries
FREE Houses! All You Have to Do Is Move Them. - CIRCA Old Houses
Chadrad Swap Shop
Donald Trump Assassination Gold Coin JD Vance USA Flag President FIGHT CIA FBI • $11.73
The Latest: Trump addresses apparent assassination attempt on X
Workboy Kennel
Missouri State Highway Patrol Will Utilize Acadis to Improve Curriculum and Testing Management
Games R Us Dallas
Buhsd Studentvue
Bbc Gahuzamiryango Live
Sunrise Garden Beach Resort - Select Hurghada günstig buchen | billareisen.at
2700 Yen To Usd
Encompass.myisolved
Japanese Big Natural Boobs
Whitney Wisconsin 2022
Star Sessions Snapcamz
Is Chanel West Coast Pregnant Due Date
How to Get a Check Stub From Money Network
Provincial Freeman (Toronto and Chatham, ON: Mary Ann Shadd Cary (October 9, 1823 – June 5, 1893)), November 3, 1855, p. 1
Att Corporate Store Location
Fishing Hook Memorial Tattoo
Scholar Dollar Nmsu
Primary Care in Nashville & Southern KY | Tristar Medical Group
Latest Posts
Article information

Author: Aron Pacocha

Last Updated:

Views: 6181

Rating: 4.8 / 5 (68 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Aron Pacocha

Birthday: 1999-08-12

Address: 3808 Moen Corner, Gorczanyport, FL 67364-2074

Phone: +393457723392

Job: Retail Consultant

Hobby: Jewelry making, Cooking, Gaming, Reading, Juggling, Cabaret, Origami

Introduction: My name is Aron Pacocha, I am a happy, tasty, innocent, proud, talented, courageous, magnificent person who loves writing and wants to share my knowledge and understanding with you.