Public-key cryptography: Difference between revisions

Content deleted Content added
m Reverting possible vandalism by 105.113.70.81 to version by Codename Noreste. Report False Positive? Thanks, ClueBot NG. (4370095) (Bot)
No edit summary
Tags: Reverted Visual edit Mobile edit Mobile web edit
Line 1:
{{short description|Cryptographic system with public and private keys}}
{{Use dmy dates|date=October 2019}}[[File:Public-key-crypto-1.svg|thumb|250px|right|An unpredictable (typically large and [[random]]) number is used to begin generation of an acceptable pair of [[cryptographic key|keys]] suitable for use by an asymmetric key algorithm.]]
{{Use dmy dates|date=October 2019}}
[[File:Private key signing.svg|thumb|250px|In this example the message is [[digitalDigital signature|digitallySignature signedStandard|Wcampbell]] with Alice's private key, but the message itself is not encrypted.
{{more citations needed|reason=article with large unreferenced sections|date=January 2024}}
 
[[File:Public-key-crypto-1.svg|thumb|250px|right|An unpredictable (typically large and [[random]]) number is used to begin generation of an acceptable pair of [[cryptographic key|keys]] suitable for use by an asymmetric key algorithm.]]
[[File:Private key signing.svg|thumb|250px|In this example the message is [[digital signature|digitally signed]] with Alice's private key, but the message itself is not encrypted.
1) Alice signs a message with her private key.
2) Using Alice's public key, Bob can verify that Alice sent the message and that the message has not been modified.]]