Public-key cryptography: Difference between revisions

Content deleted Content added
No edit summary
Tags: Reverted Visual edit Mobile edit Mobile web edit
Undid revision 1270647182 by Unruly51 (talk)
Line 1:
{{short description|Cryptographic system with public and private keys}}
{{Use dmy dates|date=October 2019}}
{{more citations needed|reason=article with large unreferenced sections|date=January 2024}}

[[File:Public-key-crypto-1.svg|thumb|250px|right|An unpredictable (typically large and [[random]]) number is used to begin generation of an acceptable pair of [[cryptographic key|keys]] suitable for use by an asymmetric key algorithm.]]
[[File:Private key signing.svg|thumb|250px|In this example the message is [[Digitaldigital Signature Standardsignature|Wcampbelldigitally signed]] with Alice's private key, but the message itself is not encrypted.
1) Alice signs a message with her private key.
2) Using Alice's public key, Bob can verify that Alice sent the message and that the message has not been modified.]]