Definitions for

**"Key pair"****Related Terms:**Public/private key pair, Private key, Public-key cryptography, Public key encryption, Public key, Asymmetric encryption, Public key cryptography, Pkc, Asymmetric cryptography, Public-key encryption, Symmetric key, Private key encryption, Secret key, Key, Encryption key, Diffie-hellman, Preshared key, Rsa encryption, Symmetric encryption, Session key, Public-key infrastructure, Symmetric-key cryptography, Symmetric algorithm, Perfect forward secrecy, Symmetric cryptography, Cryptosystem, Public key cryptography standards, Ciphertext, Encryption algorithm, Hmac, Cryptography, Key recovery, Pfs , Diffie-hellman key exchange, Pke, Ike, Rsa, Pkcs, Cipher suite, Keyring , Data encryption key, Cryptographic key, Dek, Idea, Cipher, Triple des, One-time pad, Pkcs #7, Message authentication code, Digital signature algorithm

In public key cryptography, the entity's public key and its corresponding private key.

A private key and its corresponding public key in an asymmetric cryptosystem, keys which have the property that the public key can verify a digital signature that the private key creates.

An associated public and private key where the correspondence between the two are mathematically related, but it is computationally infeasible to derive the private key from the public key.

The combination of private and public encryption keys that provides verification of the source of data sent across a network. See also certificate, client; digital signature; session key.

a pair of very long numbers generated to assist you in encrypting and decrypting your files

a set of a public and a secret key which belong together

a set of two numbers that the PGP uses to encrypt and decrypt information

A set of two keys used in public key cryptography. One is the public key used to encrypt data, and the other is the private key necessary to decrypt the same data.

A public key and its associated private key.

A set of a public and a private key that belong together.

A pair of asymmetric cryptographic keys (ie one decrypts messages which have been encrypted using the other) consisting of a public key and a private key.

Two mathematically related keys having the properties that (1) one key can be used to encrypt a message that can only be decrypted using the other key, and (ii) even knowing one key, it is computationally infeasible to discover the other key.

In computer security, a public key and a private key. When the key pair is used for encryption, the sender uses the public key to encrypt the message, and the recipient uses the private key to decrypt the message. When the key pair is used for signing, the signer uses the private key to encrypt a representation of the message, and the recipient uses the public key to decrypt the representation of the message for signature verification.

Two integrated keys: one public, one private.

public key and its associated private key. See public and private key pair

private key and its related public key.

The use of the public and private key together. The public key is used to exchange and encrypt the private key.

This is a pair of electronic keys that make up a Digital Certificate, one of which is public and the other is private. These keys are used in the operation of signing and encrypting email and electronic documents.

public and private key used together for public key encryption. Information encrypted with one key in the pair can only be decrypted using the other key in the pair.

In secure communications, a public key and a private key. The sender uses the private key to encrypt the message; the recipient uses the public key to decrypt the message. Because the private key holds more of the encryption pattern than the public key does, the key pair is called asymmetric. See also public key and private key.

In a public key cryptosystem, the set of keys which consists of a public key and a private key that are associated with an entity.

A public key and a private key, used together in PKI to encrypt and decrypt data.

A Public Key and its corresponding Private Key in Public Key Cryptography (also known as asymmetric cryptography); keys that have the property that the Public Key can verify a Digital Signature that the corresponding Private Key creates; keys that can encrypt and decrypt information for confidentiality purposes, in which the Public Key is used to encrypt data that can be decrypted only by using the intended recipient's corresponding Private Key. (See Public Key Cryptography.)

A pair of unique values that are used to establish an SSL connection, encrypt data being transmitted, or both. In public key cryptography there is a private key and a public key. Messages that the private key encrypts can only be decrypted with the public key, and vice-versa.

Public key cryptography uses a pair of key codes related to each other in this way: if you lock-up data using one key code, you can only unlock it using the other key code. And vice versa. One of the keys is made known publicly, while the other is kept private. The two, together, form a key pair. See also key and keyring.

The full key information in a public-key cryptosystem, consisting of the public key and private key.