File:Public key signing.svg
Original file (SVG file, nominally 560 × 510 pixels, file size: 21 KB)
Captions
Summary
[edit]DescriptionPublic key signing.svg |
Public-key cryptography / asymmetric cryptography, signing. A message that is signed (encrypted) with the private key can be verified (decrypted) with the public key. Since the public key is public, anyone can verify the signature. The public key cannot create such signatures. Security depends on the secrecy of the private key. Original illustration by David Göthberg, Sweden. Released by David as public domain. |
Date | |
Source | Own work |
Author | Davidgothberg |
Other versions |
This image is part in a series of images showing the four basic public-key cryptography operations: Creating a key pair, encrypting, signing, and creating a shared secret. Note that no single cryptosystem can do all three operations: For instance RSA can do encryption and signing, while Diffie–Hellman can create shared secrets. |
SVG development InfoField | This W3C-invalid diagram was created with Inkscape…important. This diagram uses embedded text that can be easily translated using a text editor. |
Licensing
[edit]Public domainPublic domainfalsefalse |
I, the copyright holder of this work, release this work into the public domain. This applies worldwide. In some countries this may not be legally possible; if so: I grant anyone the right to use this work for any purpose, without any conditions, unless such conditions are required by law. |
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 19:15, 21 August 2006 | 560 × 510 (21 KB) | Davidgothberg (talk | contribs) | Improved image. | |
08:37, 7 August 2006 | 540 × 400 (14 KB) | Davidgothberg (talk | contribs) | Public-key cryptography / asymmetric cryptography, signing. A message that is signed (encrypted) with the secret key can be verified (decrypted) with the public key. Since the public key is public any one can verify the signature. The public key can not |
You cannot overwrite this file.
File usage on Commons
The following 4 pages use this file:
File usage on other wikis
The following other wikis use this file:
- Usage on ca.wikipedia.org
- Usage on da.wikipedia.org
- Usage on en.wikipedia.org
- Usage on en.wikibooks.org
- A-level Computing 2009/AQA/Problem Solving, Programming, Operating Systems, Databases and Networking/Communication and Networking/Internet Security
- User:Zacchaeusluke/sandbox
- A-level Computing/AQA/Problem Solving, Programming, Operating Systems, Databases and Networking/Communication and Networking/Internet Security
- A-level Computing/AQA/Paper 2/Fundamentals of communication and networking/Internet security
- Usage on th.wikipedia.org
- Usage on uz.wikipedia.org
- Usage on www.wikidata.org