Content deleted Content added
BTC Tags: Reverted Visual edit Mobile edit Mobile web edit |
ClueBot NG (talk | contribs) m Reverting possible vandalism by 105.113.70.81 to version by Codename Noreste. Report False Positive? Thanks, ClueBot NG. (4370095) (Bot) |
||
Line 9:
[[File:Public key shared secret.svg|thumb|250px|right| In the [[Diffie–Hellman key exchange]] scheme, each party generates a public/private key pair and distributes the public key of the pair. After obtaining an authentic (n.b., this is critical) copy of each other's public keys, Alice and Bob can compute a shared secret offline. The shared secret can be used, for instance, as the key for a [[symmetric cipher]], which will be, in essentially all cases, much faster.]]
[[File:Public key encryption.svg|thumb|250px|right|In an asymmetric key encryption scheme, anyone can encrypt messages using a public key, but only the holder of the paired private key can decrypt such a message. The security of the system depends on the secrecy of the private key, which must not become known to any other.]]
'''
There are many kinds of public-key cryptosystems, with different security goals, including [[digital signature]], [[Diffie-Hellman key exchange]], [[Key encapsulation mechanism|public-key key encapsulation]], and public-key encryption.
|