public-key cryptography
public-key encryption
Nearby terms:
pubic directory « public domain « public domain
software «
public-key cryptography » Public-Key
Cryptography Standards » public-key encryption »
Public Key Infrastructure
Public-Key Cryptography Standards
<cryptography, standard> (PKCS) A set of standards for public-key
cryptography, developed by RSA Data Security, Inc. in cooperation with an
informal consortium, originally including Apple, Microsoft, DEC, Lotus, Sun and
MIT. The PKCS have been cited by the OSI Implementers' Workshop (OIW) as a
method for implementation of OSI standards.
PKCS includes both algorithm-specific and algorithm-independent implementation
standards. Many algorithms are supported, including RSA and Diffie-Hellman key
exchange, however, only the latter two are specifically detailed. PKCS also
defines an algorithm-independent syntax for digital signatures, digital
envelopes, and extended digital certificates; this enables someone implementing
any cryptographic algorithm whatsoever to conform to a standard syntax, and thus
achieve interoperability.
E-mail: pkcs@rsa.com.
(1999-02-16)
Nearby terms:
public domain « public domain software « public-key
cryptography « Public-Key Cryptography Standards
» public-key encryption » Public Key Infrastructure
» Public Switched Telephone Network
public-key encryption
<cryptography> (PKE, Or "public-key cryptography") An encryption scheme,
introduced by Diffie and Hellman in 1976, where each person gets a pair of keys,
called the public key and the private key. Each person's public key is published
while the private key is kept secret. Messages are encrypted using the intended
recipient's public key and can only be decrypted using his private key. This is
often used in conjunction with a digital signature.
The need for sender and receiver to share secret information (keys) via some
secure channel is eliminated: all communications involve only public keys, and
no private key is ever transmitted or shared.
Public-key encryption can be used for authentication, confidentiality, integrity
and non-repudiation.
RSA encryption is an example of a public-key cryptosystem.
alt.security FAQ.
See also knapsack problem.
(1995-03-27)
Nearby terms:
public domain software « public-key cryptography «
Public-Key Cryptography Standards « public-key
encryption
» Public Key Infrastructure » Public Switched
Telephone Network » puff
Public Key Infrastructure
<cryptography, communications> (PKI) A system of public key encryption
using digital certificates from Certificate Authorities and other registration
authorities that verify and authenticate the validity of each party involved in
an electronic transaction.
PKIs are currently evolving and there is no single PKI nor even a single
agreed-upon standard for setting up a PKI. However, nearly everyone agrees that
reliable PKIs are necessary before electronic commerce can become widespread.
US DOD PKI.
US NIST PKI.
IETF PKIX Working Group.
(1999-11-30)
Nearby terms:
public-key cryptography « Public-Key Cryptography
Standards « public-key encryption « Public Key
Infrastructure » Public Switched Telephone
Network » puff » PUFFT
|