Computer Networking
Computer Terminology
Computer Security

What are public keys and private keys in networking?

Top Answer
User Avatar
Wiki User
Answered 2015-08-05 05:57:53

The Public and Private key pair comprise of two uniquely related cryptographic keys (basically long random numbers). Below is an example of a Public Key:

3048 0241 00C9 18FA CF8D EB2D EFD5 FD37 89B9 E069 EA97 FC20 5E35 F577 EE31 C4FB C6E4 4811 7D86 BC8F BAFA 362F 922B F01B 2F40 C744 2654 C0DD 2881 D673 CA2B 4003 C266 E2CD CB02 0301 0001

The Public Key is what its name suggests - Public. It is made available to everyone via a publicly accessible repository or directory. On the other hand, the Private Key must remain confidential to its respective owner. Because the key pair is mathematically related, whatever is encrypted with a Public Key may only be decrypted by its corresponding Private Key and vice versa.

For example, if Bob wants to send sensitive data to Alice, and wants to be sure that only Alice may be able to read it, he will encrypt the data with Alice's Public Key. Only Alice has access to her corresponding Private Key and as a result is the only person with the capability of decrypting the encrypted data back into its original form.

User Avatar

Your Answer


Still Have Questions?

Related Questions

What a public key cryptography?

Public key cryptography uses two keys: a private key and a public key. Public key is used to encrypt to message whereas private key is used to decrypt.

What kind of encryption uses the concept of public keys?

Asymmetric encryption employs the use of public/private key pairs.

What is the default name and path for the file which stores ssh public keys to allow a client to login using public private key authentication?

The default names for the public and private keys (on most modern Linux Distributions) is id_rsa for the private key and for the public key. They are stored in a hidden directory in the user's home directory (.ssh) The path can be written as ~/.ssh/id_rsa

Difference between public and private key?

"Public Key" and "Private Key" generally refer to the two related keys used in asymmetric encryption. They are usually interchangeable in that the algorithms that use asymmetric encryption require a pair of keys and either key could serve as the public key - likewise, either could serve as the private key. Once one of the keys in the pair is designated as the public key though, the other is then the private key and their designations are permanent - once you choose a key to be the private key, it STAYS the private key. Until the choice is made as to which key in the pair will serve which function, there is NO difference between the public and private key. Once the decision is made, the public key is published for all to use while the owner of the private key is supposed to keep that key PRIVATE (secret).

How many keys are used in asymmetric encryption?

Asymmetric encryption uses at least 2 keys - hence the asymmetry. The keys for encryption and decryption are not the same, so they are not "symmetric". Usually only 2 keys are used - a public key and a private key. The public key is published to a key registry or sent separately to those the key-pair owner wants to communicate with. The private key is retained by the owner. Messages encrypted with the private key can only be decrypted using the public key. If the source of the public key is trusted, this provides some proof of the source of the message. Messages encrypted with the public key can only be decrypted using the private key - so only the owner of the private key should be able to decrypt messages encrypted with their own private key.

What is one of the purposes of NAT?

The purpose of the NAT in networking is to translate private Ips to public ip so they can communicate on the net

How many keys are utilized in asymmetric encryption?

In all forms of asymmetric encryption that I am familiar with, a pair of related keys are used (ie. two keys). One key is used for encryption and the other is used for decryption. The two keys are referred to as the Public key and the Private key. The Public key is published for the world to see and use for sending messages to the holder of the Private key and for decrypting and authenticating messages encrypted or signed by the holder of the Private key. The Private key can also be used by the holder to decrypt messages sent to them which have been encrypted using their Public key.

How many keys are normally utilized in aymmetric encryption?

Most asymmetric encryption algorithms use 2 keys - the public key and the private key. The public key is published in a key registry or sent to another user or system. The private key is retained by the individual or system that the key is associated with.

Difference between Private-Key and Public-Key encryption algorithms?

Public key encryption refers to a type of cypher or code architecture known as public key cryptography that utilizes two keys, or a key pair), to encrypt and decrypt data. One of the two keys is a public key, which anyone can use to encrypt a message for the owner of that key. The encrypted message is sent and the recipient uses his or her private key to decrypt it. This is the basis of public and private key encryption.

When was Keys Public School created?

Keys Public School was created in 1955.

Public key encryption is also known as asymmetric encryption?

Yes. Public Key encryption (or asymmetric encryption) requires a pair of keys; a public and a private key for exchanging data in a secure manner.

Is cal state university Long Beach private or public?

It is a state university and as such is a public institution, not private.It is a state university and as such is a public institution, not private.It is a state university and as such is a public institution, not private.It is a state university and as such is a public institution, not private.It is a state university and as such is a public institution, not private.It is a state university and as such is a public institution, not private.

Can you get a dUI on a private road?

Yes. If you are in a vehicle with the keys in the ignition, you are considered to be driving that vehicle regardless if it is public or private road. You can be arrested in your own driveway even if you do not even have the vehicle started.

Is Asda private or public business?

is nieghter private or public

What is private sector networking?

a peel black in the rear of a zebras tail is what a private sector of networking is. also Satan is putting his peel black in Caleb Gentrys peel black.

What are private and public sectors?

private and public sectors deal with government.

How do you change public to private profile?

how do i change my public to private profile?

What are the examples of public and private key?

example for the private and public key

Difference between symmetric key encryption and public key encryption?

Symmetric encryption is a single shared, private key between communicating nodes. There is only 1 key involved. Public Key encryption (or asymmetric encryption) requires a pair of keys; a public and a private key for exchanging data in a secure manner.

What is Public-Private Alliance Foundation's motto?

Public-Private Alliance Foundation's motto is 'Public-Private Partnerships For Sustainable Development'.

Difference between private and public sector?

private sectors are more private than public sectors

How does a private company differ from a public company?

A private company differs from a public company by how it does its research. A public company can dip into public capital markets as to where private companies cannot.

The difference between private and public administration?

Public is open, private is closed.

Similarities of public and private administration?

What public administration can adopt from private administration

The importance of public private partnerships?

The importance of public and private partnership initiative