This encryption method requires two unique software keys to for decrypting data, one public and one private. Data is encrypted using the published public keys and the unpublished private keys are used to decrypt the data. Pretty Good Privacy (PGP) is a well-known example of this kind of encryption system. This system provides secure data across a public network.

An asymmetric scheme that uses a pair of keys for encryption: The public key encrypts data, and a corresponding secret key decrypts it. For digital signatures, the process is reversed: The sender uses the secret key to create a unique electronic number that can be read by anyone possessing the corresponding public key, which verifies that the message is truly from the sender. See also RSA; session key.

one of the strongest encryption methods available, it's a system that uses two keys - a public key known to everyone and a private or secret key known only to the recipient of the message. An important element to the public key system is that only the public key can encrypt messages and only the corresponding private key can decrypt them. Public-key systems, such as PGP, are becoming popular for transmitting information via the Internet because they are extremely secure and relatively simple to use.

An encryption method that requires two unique software keys (one public and one private) for decrypting the data, making it secure across public networks. Pretty Good Privacy (PGP) is a well-known public-key encryption system.

A method of encryption that uses two encryption keys that are mathematically related. One key is called the private key and is kept confidential. The other is called the public key and is freely given out to all potential correspondents. In a typical scenario, a sender uses the receiver's public key to encrypt a message. Only the receiver has the related private key to decrypt the message. The complexity of the relationship between the public key and the private key means that, provided the keys are long enough, it is computationally infeasible to determine one from the other. Public key encryption is also called asymmetric encryption. See also public key; symmetric key encryption.

An encryption system that uses two keys, a public key for encrypting messages and a private key for decrypting messages, to enable users to verify each other's messages without exchanging secret keys. For use in PIN-Based Debit.

A technique for encrypting information such that the key used to decrypt the message is different from the key used to encrypt the message.

A cryptographic system that uses a public key and a private or secret key. An important element to the public key system is that the public and private keys are related in such a way that only the public key can be used to encrypt messages and only the corresponding private key can be used to decrypt them.

Encryption that uses two keys: a public key for encrypting data, and a private key for decrypting data. Someone sending you encrypted information encrypts it using your public key. The information can then only be decrypted using your private key.

An encryption system that uses two keys, a public key for encrypting messages and a private key for decrypting messages, to enable users to verify each other's messages without exchanging secret keys. ecBuilder uses Public Key technology.

An encryption scheme in which each user has two keys, one public key and one private key. In public-key encryption, the sender uses the receiver's public key to encrypt the message, and the receiver uses a private key to decrypt it. SEAM is a private-key system. See also private-key encryption.

The process where the sender of a message encrypts the message with the public key of the recipient. Upon delivery, the message is decrypted by the recipient using its private key.

An encryption scheme, introduced by Diffie and Hellman in 1976, where each person gets a pair of keys, called the public key and the private key. Each person's public key is published while the private key is kept secret. Messages are encrypted using the intended recipient's public key and can only be decrypted using his private key.