Content deleted Content added
ClueBot NG (talk | contribs) m Reverting possible vandalism by 105.113.70.81 to version by Codename Noreste. Report False Positive? Thanks, ClueBot NG. (4370095) (Bot) |
No edit summary Tags: Reverted Visual edit Mobile edit Mobile web edit |
||
Line 1:
{{short description|Cryptographic system with public and private keys}}
{{Use dmy dates|date=October 2019}}[[File:Public-key-crypto-1.svg|thumb|250px|right|An unpredictable (typically large and [[random]]) number is used to begin generation of an acceptable pair of [[cryptographic key|keys]] suitable for use by an asymmetric key algorithm.]]▼
[[File:Private key signing.svg|thumb|250px|In this example the message is [[
▲[[File:Public-key-crypto-1.svg|thumb|250px|right|An unpredictable (typically large and [[random]]) number is used to begin generation of an acceptable pair of [[cryptographic key|keys]] suitable for use by an asymmetric key algorithm.]]
▲[[File:Private key signing.svg|thumb|250px|In this example the message is [[digital signature|digitally signed]] with Alice's private key, but the message itself is not encrypted.
1) Alice signs a message with her private key.
2) Using Alice's public key, Bob can verify that Alice sent the message and that the message has not been modified.]]
|