skip to Main Content
This website use cookies which are necessary to its functioning and required to achieve the purposes illustrated in the privacy policy. To learn more or withdraw consent please click on Learn More. By continued use of this website you are consenting to our use of cookies.

GLOSSARY

Public-Key Cryptography

Public-key cryptography is a method of cryptography that uses pairs of keys.

Public-key cryptography is a method of cryptography that uses pairs of keys. Public-key cryptography is also known as asymmetric cryptography. Each pair consists of a public key (known to others) and a private key (known only to the key owner). Public-key cryptography uses this pair of mathematically related keys for encryption and decryption. If a public key is used for encryption, the private key must be used for decryption and vice versa. Public-key cryptography is primarily used for authentication and confidentiality. With public-key cryptography, if a message is signed with a private key, any public key holder can verify that the message was sent by the entity (person or group) possessing the corresponding private key. This key pairing can then be combined with a proof of identity system to know what entity owns that private key, providing authentication.

Want to learn more? Check out our FREE Bugcrowd University to sharpen your hacking skills.

Organizations the world over need your help! Join our researcher community to connect with hundreds of organization programs focused on finding their security vulnerabilities. Our vast directory includes programs for all skill levels, across many industries and from around the world.

Back To Top