Public Key Cryptography definition

Public Key Cryptography means a form of cryptography (a process of creating and deciphering communications to keep them secure) in which two keys are used. One key encrypts a message, and the other key decrypts the message. One key, the Private Key, is kept secret, and the other, the Public Key, is made available to others. These keys are, in essence, large mathematically related numbers that form a unique pair. Either key may be used to encrypt a message, but only the other corresponding key may be used to decrypt the message.

Examples of Public Key Cryptography in a sentence

  • PKCS #11 (Public Key Cryptography Standard #11) defines a platform- independent API for the control of hardware security modules (HSMs) and other cryptographic support devices.BIND 9 is known to work with two HSMs: The Sun SCA 6000 cryptographic acceleration board, tested under Solaris x86, and the AEP Keyper network-attached key storage device, tested with Debian Linux, Solaris x86 and Windows Server 2003.

  • ANS X9.62, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Standard (ECDSA), was developed for the American National Standards Institute by the Accredited Standards Committee on Financial Services, X9.

  • Public Key Cryptography: A type of cryptography (a process of creating and deciphering communications to keep them secure) that uses a Key Pair to securely encrypt and decrypt messages.

  • The use of the RSA algorithm for digital signature generation and verification is specified in American National Standard (ANS) X9.31 and Public Key Cryptography Standard (PKCS) #1.

  • ANS X9.31, Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry (rDSA), was developed for the American National Standards Institute by the Accredited Standards Committee on Financial Services, X9.

  • The IT Act aims at promoting the growth of E-Commerce and E-Governance through the use of Electronic Signatures including Public Key Cryptography based digital signatures.CCA licenses Certifying Authorities (CAs) and exercise supervision over their activities.

  • In: International Workshop on Practice and Theory in Public Key Cryptography (PKC ’98), pages 117–134, 1998.

  • Public Key Cryptography (PKC) solutions were first considered impractical on sensors devices with limited resources.

  • In Public Key Cryptography, volume 3958 of Lecture Notes in Computer Science, pages 207–228.

  • In Yvo Desmedt, editor, Public Key Cryptography - PKC 2003, volume 2567 of LNCS, pages 31–46.

Related to Public Key Cryptography

  • Cannabis waste means waste that is not hazardous waste, as defined in Public Resources Code section 40141, that contains cannabis and that has been made unusable and unrecognizable in the manner prescribed in sections 5054 and 5055 of this division.

  • Database means the Commercial Driver Alcohol and Drug Testing Database of the Office of Driver Services of the Arkansas Department of Finance and Administration.

  • Biological agent shall mean any pathogenic (disease producing) micro-organism(s) and/or biologically produced toxin(s) (including genetically modified organisms and chemically synthesized toxins) which cause illness and/or death in humans, animals or plants.

  • child pornography means any visual depiction, including any photograph, film, video, picture, or computer or computer-generated image or picture, whether made or produced by electronic, mechanical, or other means, of sexually explicit conduct, where—