What is a public key encryption?

Public key encryption is a type of cipher architecture known as Public Key cryptography, which uses two keys or a few keys to encrypt and decrypt data. One of the two keys is the public key that anyone can use to encrypt the message for the owner of this key. The encrypted message is sent and the recipient uses his private key to decrypt the key. This is the basis of public key encryption.

This type of encryption is considered very safe because it does not require a secret shared key between the sender and the receiver. Other encryption technologies that use one shared key to encryption and decryption data rely on both sides that decide on the key in advance without finding out what the key is. However, the fact that it must be shared between the two sides opens the door to third parties that capture the key. This type of encryption technology is called symmetrical encryption, while public key encryption is known as asymmetric encryption.

"Key" Je simply a small piece of text code that triggers an associated algorithm for encoding or decoding text. When encrypting a public key, a pair of keys is generated using the encryption program and the couple is connected with the name or e -mail address. The public key can then be published by publishing its keyboard server, a computer that hosts a database of public keys. Alternately, the public key can be discriminated with e -mail to friends and collaborators. Those who have a public key can use it to encrypt the message to the person or the e-mail address associated with. After receiving an encrypted message, the private key decrypts it.

Public key encryption is particularly useful for maintaining private e -mail. Any stored messages on postal servers that may persist for years will be unreadable and the transit messages will also be unreadable. This degree of privacy may be an excessive year one does not realize the open nature of the Internet. Sending e -mail unnicrophedIt is similar to publishing for anyone who read them now or in the future.

The best known and respected program encryption of public keys is PGP (quite good privacy), which offers an encryption of military class. PGP has plugins for most major e-mail clients, so clients work in accordance with PGP to encrypt outbound messages and automatically decrypt the incoming messages. PGP maintains a "key ring" or set of public keys collected. E -mail address can be connected to the key, so the e -mail client automatically selects the right public key from the PGP key to encrypt the message after shipping. It also automatically uses a private key to decrypt the incoming mail. If you want to use the public key encryption for e -mail, the sender and the receiver must have the encryption software installed.

The

programs, such as PGP, also have a built -in digital signature. With this feature, the messages can send a message digitally signed by clicking the button to get the receiverHe knew the message was not manipulated with the road and is authentic or from the sender. Public key encryption can also be used for secure storage of data files. In this case, the public key is used to encrypt files while the private key decrypts them.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?