Content deleted Content added
Undid revision 1299606031 by 109.40.243.28 (talk) |
|||
Line 180:
== Applications ==
The most obvious application of a public key encryption system is for encrypting communication to provide [[confidentiality]] – a message that a sender encrypts using the recipient's public key, which can be decrypted only by the recipient's paired private key. Most digital services such as financial services, email, and messaging applications utilized daily are secured using public key encryption. <ref>{{Cite web |date=2025-06-05 |title=Post-Quantum Cryptography: A New Security Paradigm for the Post-Quantum Era |url=https://www.pentasecurity.com/blog/security-issue-post-quantum-cryptography/ |access-date=2025-07-10 |website=Penta Security Inc. |language=en-US}}</ref>
Another application in public key cryptography is the [[digital signature]]. Digital signature schemes can be used for sender [[authentication]].
|