public key - Glossary | CSRC (2024)

Definitions:

The public part of an asymmetric key pair that is typically used to verify signatures or encrypt data.
Sources:
FIPS 201-3 under Public Key
NIST SP 1800-12b

A cryptographic key that is used with an asymmetric (public key) cryptographic algorithm and is associated with a private key. The public key is associated with an owner and may be made public. In the case of digital signatures, the public key is used to verify a digital signature that was generated using the corresponding private key.
Sources:
FIPS 186-5 under Public key

A cryptographic key that is used with an asymmetric (public-key) cryptographic algorithm and is associated with a private key. The public key is associated with an owner and may be made public. In the case of digital signatures, the public key is used to verify a digital signature that was generated using the corresponding private key.
Sources:
FIPS 204
FIPS 205 from FIPS 186-5

A mathematical key that has public availability and that applications use to verify signatures created with its corresponding private key. Depending on the algorithm, public keys can encrypt messages or files that the corresponding private key can decrypt.
Sources:
CNSSI 4009-2015 from CNSSI 1300

A cryptographic key used with a public key cryptographic algorithm that is uniquely associated with an entity and that may be made public.
Sources:
NIST SP 800-12 Rev. 1 under Public Key from FIPS 140-2

A cryptographic key used by a public-key (asymmetric) cryptographic algorithm that may be made public.
Sources:
NIST SP 800-152 under Public key

A cryptographic key that may be made public and is used with a public-key cryptographic algorithm. A public key is associated with a private key.
Sources:
NIST SP 800-56B Rev. 2 under Public key

The public part of an asymmetric key pair that is used to verify signatures or encrypt data.
Sources:
NIST SP 1800-16B under Public Key from NIST SP 800-63-3
NIST SP 1800-16C under Public Key from NIST SP 800-63-3
NIST SP 1800-16D under Public Key from NIST SP 800-63-3
NIST SP 1800-17b under Public Key
NIST SP 1800-17c under Public Key
NIST SP 800-63-3 under Public Key

A cryptographic key that is used with an asymmetric (public key) cryptographic algorithm and is associated with a private key. The public key is associated with an owner and may be made public. In the case of digital signatures, the public key is used to verify a digital signature that was signed by the corresponding private key.
Sources:
NIST SP 800-89 under Public key

A cryptographic key used with a public-key cryptographic algorithm that is uniquely associated with an entity and that may be made public. The public key has a corresponding private key. The public key may be known by anyone and, depending on the algorithm, may be used: 1. To verify a digital signature that is signed by the corresponding private key, 2. To encrypt keys that can be decrypted using corresponsing private key, or 3. As on of the input values to compute a shared secret during a key agreement transaction.
Sources:
NIST SP 800-57 Part 2 Rev.1 under Public key

A cryptographic key used with a public-key (asymmetric-key) algorithm that is uniquely associated with an entity and that may be made public. In an asymmetric (public) key cryptosystem, the public key is associated with a private key. The public key may be known by anyone and, depending on the algorithm, may be used to 1. Verify a digital signature that is signed by the corresponding private key, 2. Encrypt data that can be decrypted by the corresponding private key, or 3. Compute a shared secret during a key-agreement process.
Sources:
NIST SP 800-175B Rev. 1 under Public key

A cryptographic key used with a public-key cryptographic algorithm that is uniquely associated with an entity and that may be made public. In an asymmetric-key (public-key) cryptosystem, the public key has a corresponding private key. The public key may be known by anyone and, depending on the algorithm, may be used, for example, to: 1. Verify a digital signature that was generated using the corresponding private key, 2. Encrypt keys that can be decrypted using the corresponding private key, or 3. Compute a shared secret during a key-agreement transaction.
Sources:
NIST SP 800-57 Part 1 Rev. 5 under Public key

A cryptographic key used with an asymmetric-key (public-key) cryptographic algorithm that may be made public and is associated with a private key and an entity that is authorized to use that private key. Depending on the algorithm that employs the public key, it may be used to:1. Verify a digital signature that is signed by the corresponding private key;2. Encrypt data that can be decrypted by the corresponding private key; or3. Compute a piece of shared data (i.e., data that is known only by two or more specific entities).
Sources:
NIST SP 800-133 Rev. 2 under Public key

public key - Glossary | CSRC (2024)

FAQs

Why is public key encryption hard to crack? ›

Key pairs are generated with cryptographic algorithms based on mathematical problems termed one-way functions. Security of public-key cryptography depends on keeping the private key secret; the public key can be openly distributed without compromising security.

What are the 5 steps to public key encryption? ›

Public key encryption involves five steps: key generation, key exchange, encryption, sending encrypted data, and decryption.

Is public key encryption safe? ›

Secure Communication: Public key encryption ensures that sensitive communication between two parties remains secure, even if intercepted by hackers. The public key is used to encrypt the message, and the recipient's private key is used for decryption. This ensures that only the intended recipient can read the message.

What is the public key secret? ›

A message gets encrypted by a public key, which is available to everyone, and can only be decrypted with its unique private key,which is only available to its owner. Public keys have been described by some as being like a business' physical address – it's public and anyone can look it up and share it widely.

What is the hardest cryptography to crack? ›

AES 256-bit encryption is the strongest and most robust encryption standard that is commercially available today. While it is theoretically true that AES 256-bit encryption is harder to crack than AES 128-bit encryption, AES 128-bit encryption has never been cracked.

What is the hardest to crack encryption? ›

AES-256 encryption is virtually uncrackable using any brute-force method. It would take millions of years to break it using the current computing technology and capabilities.

Can a public key be intercepted? ›

Public key encryption is also called asymmetric encryption, because the same key cannot be used to encrypt and decrypt the message. Instead, one key of a pair is used to undo the work of the other. With symmetric key encryption, beware of stolen or intercepted keys.

How to decrypt public key? ›

Data encrypted with the public key can only be decrypted with the private key. Because of this use of two keys instead of one, public key cryptography is also known as asymmetric cryptography.

What is the most common public key encryption? ›

The most commonly used public-key cryptosystem is RSA, which is named after its three developers Ron Rivest (b. 1947), Adi Shamir, and Leonard Adleman (b. 1945). At the time of the algorithm's development (1977), the three were researchers at the MIT Laboratory for Computer Science.

Can a private key have multiple public keys? ›

It's actually possible to generate several public keys from the same private key. However, you'll only ever have one private key. And while it's theoretically possible to guess or calculate the public key from the private key, the reverse would take hundreds of years to crack.

Can a public key be exposed? ›

Public: As the name implies, this type of key is widely available for anyone to see. Private: This form of key is closely guarded and protected. Only you should know about it.

How to generate a public key? ›

To generate an SSH private/public key pair for your use, you can use the ssh-keygen command-line utility. You can run the ssh-keygen command from the command line to generate an SSH private/public key pair. If you are using Windows, by default you may not have access to the ssh-keygen command.

Where are public keys stored? ›

The public key is used by both the user and the remote server to encrypt messages. On the remote server side, it is saved in a public key file. On the user's side, it is stored in SSH key management software or in a file on their computer.

What is a public key example? ›

Assume that Bob wants to send a secret message to Alice using public-key cryptography. Alice has both a public key and a private key, so she keeps her private key in a safe place and sends her public key to Bob. Bob encrypts the secret message to Alice using Alice's public key.

Can you crack a public key? ›

The public key is used to encrypt plaintext or to verify a digital signature; whereas the private key is used to decrypt ciphertext or to create a digital signature. Hopefully, this helps answer your question about “public” key being broken as Security-general-l states, no one breaks a public key.

What is the problem with public key encryption? ›

If user private key used for certificate creation higher in the PKI (Public Key Infrastructure) server hierarchy is compromised, or accidentally disclosed, then a “man-in-the-middle attack” is also possible, making any subordinate certificate wholly insecure. This is also the weakness of public key Encryption.

Why is public key encryption inefficient for long messages? ›

It's a slow process compared to symmetric cryptography. It's, therefore, not appropriate for decrypting bulk messages. If an individual loses their private key, they can't decrypt the messages they receive. Because public keys aren't authenticated, no one can ensure a public key belongs to the person specified.

Is it possible to decrypt with a public key? ›

Public key cryptography is a method of encrypting or signing data with two different keys and making one of the keys, the public key, available for anyone to use. The other key is known as the private key. Data encrypted with the public key can only be decrypted with the private key.

Top Articles
FAQ
What is FIPS 140-2 Certification?
Dairy Queen Lobby Hours
4-Hour Private ATV Riding Experience in Adirondacks 2024 on Cool Destinations
Wells Fargo Careers Log In
Walgreens Alma School And Dynamite
Waive Upgrade Fee
Comenity Credit Card Guide 2024: Things To Know And Alternatives
Gfs Rivergate
Kaomoji Border
Walmart Windshield Wiper Blades
Bad Moms 123Movies
Craiglist Tulsa Ok
Jinx Chapter 24: Release Date, Spoilers & Where To Read - OtakuKart
라이키 유출
Urban Airship Expands its Mobile Platform to Transform Customer Communications
Vintage Stock Edmond Ok
Nearest Walgreens Or Cvs Near Me
Jeffers Funeral Home Obituaries Greeneville Tennessee
Red8 Data Entry Job
Bocca Richboro
Villano Antillano Desnuda
The Goonies Showtimes Near Marcus Rosemount Cinema
HP PARTSURFER - spare part search portal
Page 2383 – Christianity Today
Indiana Jones 5 Showtimes Near Jamaica Multiplex Cinemas
Kokomo Mugshots Busted
Forager How-to Get Archaeology Items - Dino Egg, Anchor, Fossil, Frozen Relic, Frozen Squid, Kapala, Lava Eel, and More!
Synchrony Manage Account
Facebook Marketplace Marrero La
Studentvue Columbia Heights
Bitchinbubba Face
Merkantilismus – Staatslexikon
Weather Underground Bonita Springs
Deshuesadero El Pulpo
Wlds Obits
Craigslist Tulsa Ok Farm And Garden
Wrigley Rooftops Promo Code
Lbl A-Z
Go Bananas Wareham Ma
Discover Things To Do In Lubbock
Cl Bellingham
Energy Management and Control System Expert (f/m/d) for Battery Storage Systems | StudySmarter - Talents
Sand Castle Parents Guide
Rocky Bfb Asset
Patricia And Aaron Toro
Marcal Paper Products - Nassau Paper Company Ltd. -
Gt500 Forums
Phumikhmer 2022
Honeybee: Classification, Morphology, Types, and Lifecycle
Latest Posts
Article information

Author: Aron Pacocha

Last Updated:

Views: 6181

Rating: 4.8 / 5 (68 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Aron Pacocha

Birthday: 1999-08-12

Address: 3808 Moen Corner, Gorczanyport, FL 67364-2074

Phone: +393457723392

Job: Retail Consultant

Hobby: Jewelry making, Cooking, Gaming, Reading, Juggling, Cabaret, Origami

Introduction: My name is Aron Pacocha, I am a happy, tasty, innocent, proud, talented, courageous, magnificent person who loves writing and wants to share my knowledge and understanding with you.