Log in
Enquire now
Public-key cryptography

Public-key cryptography

Cryptographic system requiring two separate keys, one of which is secret and one of which is public.

OverviewStructured DataIssuesContributors

Contents

TimelineTable: Further ResourcesReferences
ibm.com....0.14

Other attributes

Industry
Cryptocurrency
Cryptocurrency
Quantum cryptography
Quantum cryptography
Wikidata ID
Q201339

Public-key cryptography (also known as public-key encryption and asymmetric encryption) is a system for data encryption which involves a public key and an associated private key.

Public-key cryptography enables two parties to communicate securely with each other online over an insecure network. The sender first encrypts the data they wish to communicate and then sends it to the digital address of the intended recipient. Once received, the recipient uses their private key to decrypt the data. In the meantime, public-key cryptography ensures that the data being encrypted won't be altered unless the encryption is broken by an attacker, and that there is a digital record of the data being sent which can be referenced at a later date.

Bitcoin and other cryptocurrencies use public-key cryptography in the creation of new digital currency wallets and for validating transactions. The public key is also known as the wallet address because - after being converted into a hash by a cryptographic hash function - it is used to send and receive cryptocurrencies with other wallets.

The private key is meant to be a secret known only by the wallet's owner, as anybody who knows the private key and its corresponding public key can access the funds inside a wallet. The private key is used to create a digital signature for cryptocurrency transactions, ensuring that the transactions are valid and can be verified in the future.

Public-key encryption is also used for secure network connections (HTTPS websites) via SSL certificates, as well as to securely send emails via the PGP protocol.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date

Asymmetric encryption - Simply explained

https://www.youtube.com/watch?v=AQDCe585Lnc

October 30, 2017

Bitcoin Q&A: Public keys vs. addresses

https://www.youtube.com/watch?v=8es3qQWkEiU

May 10, 2018

Private and Public Key Cryptography and Ransomware

Ted Fischer

https://www.cisecurity.org/wp-content/uploads/2017/03/Cryptography.pdf

Technical background of version 1 Bitcoin addresses - Bitcoin Wiki

https://en.bitcoin.it/wiki/Technical_background_of_version_1_Bitcoin_addresses

Web

The History of Cryptography

https://cs.stanford.edu/people/eroberts/courses/soco/projects/public-key-cryptography/history.html

Web

References

Find more entities like Public-key cryptography

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.