1. /
  2. Security Response/
  3. Glossary/
  4. public key cryptography

Glossary

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | _1234567890

public key cryptography

A cryptographic system in which two different keys are used for encryption and decryption. Also called asymmetric cryptography. The sender of the message looks up the public key of the intended recipient and uses the public key to encrypt the message. The recipient then uses his or her private key, which is not made public to decrypt the message. This method of encryption is considered more secure than symmetrical cryptography because one of the keys is kept strictly private. See also public key, private key.