File:Public key encryption.svg
Original file (SVG file, nominally 525 × 513 pixels, file size: 25 KB)
Captions
Summary
[edit]DescriptionPublic key encryption.svg |
Public-key cryptography / asymmetric cryptography, encryption. Anyone can encrypt using the public key, but only the holder of the private key can decrypt. Security depends on the secrecy of the private key. Original illustration by David Göthberg, Sweden. Released by David as public domain. |
Date | |
Source | Own work |
Author | Davidgothberg |
Other versions |
This image is part in a series of images showing the four basic public-key cryptography operations: Creating a key pair, encrypting, signing, and creating a shared secret. Note that no single cryptosystem can do all three operations: For instance RSA can do encryption and signing, while Diffie–Hellman can create shared secrets.
|
SVG development InfoField | This diagram was created with Inkscape…important. This diagram uses embedded text that can be easily translated using a text editor. |
Licensing
[edit]Public domainPublic domainfalsefalse |
I, the copyright holder of this work, release this work into the public domain. This applies worldwide. In some countries this may not be legally possible; if so: I grant anyone the right to use this work for any purpose, without any conditions, unless such conditions are required by law. |
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 18:00, 19 October 2024 | 525 × 513 (25 KB) | GKNishimoto (talk | contribs) | File uploaded using svgtranslate tool (https://svgtranslate.toolforge.org/). Added translation for pt-br. | |
11:29, 2 August 2018 | 525 × 513 (20 KB) | FlippyFlink (talk | contribs) | Aligned name Bob and Alice with (portable) Inkscape editor. | ||
08:36, 7 July 2017 | 525 × 513 (20 KB) | Winstonlee (talk | contribs) | Reverted to version as of 21:11, 21 August 2006 (UTC) | ||
06:04, 6 July 2017 | 525 × 513 (20 KB) | Winstonlee (talk | contribs) | Typically Alice wants to send message to Bob using Bob's public key, instead of the reverse. | ||
21:11, 21 August 2006 | 525 × 513 (20 KB) | Davidgothberg (talk | contribs) | Improved image. | ||
19:02, 21 August 2006 | 544 × 513 (20 KB) | Davidgothberg (talk | contribs) | Improved image. | ||
07:42, 7 August 2006 | 530 × 400 (15 KB) | Davidgothberg (talk | contribs) | Public-key cryptography / asymmetric cryptography, encryption. A message that is encrypted with the public key can only be decrypted with the secret key. The public key can NOT decrypt the message. This means any one can send encrypted messages to the ow |
You cannot overwrite this file.
File usage on Commons
The following 10 pages use this file:
- User:Magog the Ogre/Multilingual legend/2024 October 17-21
- File:Asymetrická kryptografie.svg
- File:Public key encryption-ar.svg
- File:Public key encryption.svg
- File:Public key encryption alice to bob.svg
- File:Public key making.svg
- File:Public key shared secret.svg
- File:Public key signing.svg
- Category:Asymmetric key algorithms
- Category:Public-key cryptography
File usage on other wikis
The following other wikis use this file:
- Usage on ar.wikipedia.org
- Usage on bn.wikipedia.org
- Usage on ca.wikipedia.org
- Usage on de.wikipedia.org
- Usage on en.wikipedia.org
- Usage on en.wikibooks.org
- Cryptography/A Basic Public Key Example
- A-level Computing 2009/AQA/Problem Solving, Programming, Operating Systems, Databases and Networking/Communication and Networking/Internet Security
- User:Zacchaeusluke/sandbox
- A-level Computing/AQA/Problem Solving, Programming, Operating Systems, Databases and Networking/Communication and Networking/Internet Security
- A-level Computing/AQA/Paper 2/Fundamentals of communication and networking/Internet security
- Cryptography/Print version
- Usage on fr.wikibooks.org
- Usage on hy.wikipedia.org
- Usage on id.wikipedia.org
- Usage on it.wikipedia.org
- Usage on ja.wikipedia.org
- Usage on ka.wikipedia.org
- Usage on ko.wikipedia.org
- Usage on meta.wikimedia.org
- Usage on mg.wikipedia.org
- Usage on ml.wikipedia.org
- Usage on or.wikipedia.org
- Usage on pt.wikipedia.org
- Usage on ru.wikinews.org
- Usage on simple.wikipedia.org
- Usage on th.wikipedia.org
- Usage on tl.wikipedia.org
- Usage on www.wikidata.org
- Usage on zh-yue.wikipedia.org
Metadata
This file contains additional information such as Exif metadata which may have been added by the digital camera, scanner, or software program used to create or digitize it. If the file has been modified from its original state, some details such as the timestamp may not fully reflect those of the original file. The timestamp is only as accurate as the clock in the camera, and it may be completely wrong.
Width | 525.00000px |
---|---|
Height | 512.50000px |