Two related keys, a public key and a private key that are used to perform complementary operations, such as encryption and decryption or signature generation.
Source(s):
CNSSI 4009-2015
under asymmetric key
from
FIPS 201-1, NISTIR 7298 Rev. 2
Two related keys, a public key and a private key, that are used to perform complementary operations, such as encryption and decryption or signature generation and signature verification.
Source(s):
NIST SP 1800-12b
under asymmetric keys
FIPS 201
[version unknown]
under Asymmetric Keys
A cryptographic key used with an asymmetric-key (public-key) algorithm. The key may be a private key or a public key.
Source(s):
NIST SP 800-133
[Superseded]
under Asymmetric key
NIST SP 800-133 Rev.1
[Superseded]
under Asymmetric key
NIST SP 800-133 Rev. 2
under Asymmetric key
Two related keys, comprised of a public key and a private key, which are used to perform complementary operations such as encryption and decryption or signature verification and generation.
Source(s):
NIST SP 800-63-3
under Asymmetric Keys
Two related keys, a public key and a private key that are used to perform complementary operations, such as encryption and decryption or signature generation and signature verification.
Source(s):
NIST SP 800-63-2
[Superseded]
under Asymmetric Keys