The secret part of an asymmetric key pair that is typically used to digitally sign or decrypt data.
Sources:
FIPS 201-3
under Private Key
A cryptographic key that is used with an asymmetric (public key) cryptographic algorithm. The private key is uniquely associated with the owner and is not made public. The private key is used to compute a digital signature that may be verified using the corresponding public key.
Sources:
FIPS 186-5
under Private key
A mathematical key (kept secret by the holder) used to create digital signatures and, depending upon the algorithm, to decrypt messages or files encrypted (for confidentiality) with the corresponding public key.
Sources:
CNSSI 4009-2015
from
CNSSI 1300
A cryptographic key, used with a public key cryptographic algorithm, that is uniquely associated with an entity and is not made public.
Sources:
NIST SP 800-12 Rev. 1
under Private Key
from
FIPS 140-2
A cryptographic key used by a public-key (asymmetric) cryptographic algorithm that is uniquely associated with an entity and is not made public.
Sources:
NIST SP 800-152
under Private key
A cryptographic key that is kept secret and is used with a public-key cryptographic algorithm. A private key is associated with a public key.
Sources:
NIST SP 800-56B Rev. 2
under Private key
The secret part of an asymmetric key pair that is used to digitally sign or decrypt data.
Sources:
NIST SP 1800-16B
under Private Key
from
NIST SP 800-63-3
NIST SP 1800-16C
under Private Key
from
NIST SP 800-63-3
NIST SP 1800-16D
under Private Key
from
NIST SP 800-63-3
NIST SP 1800-17b
under Private Key
NIST SP 1800-17c
under Private Key
NIST SP 800-63-3
under Private Key
The secret part of an asymmetric key pair that is typically used to digitally sign or decrypt data.
Sources:
NIST SP 1800-12b
A cryptographic key that is used with an asymmetric (public key) cryptographic algorithm. For digital signatures, the private key is uniquely associated with the owner and is not made public. The private key is used to compute a digital signature that may be verified by the corresponding public key.
Sources:
NIST SP 800-89
under Private key
A cryptographic key used with a public-key cryptographic algorithm that is uniquely associated with an entity and is not made public. The private key has a corresponding public key. Depending on the algorithm, the private key may be used to: 1. Compute the corresponding public key, 2. Compute a digital signautre taht may be verified by the corresponding public key, 3. Decrypt keys that were encrypted by the corresponding public key, or 4. Compute a shared secret that during a key agreement transaction.
Sources:
NIST SP 800-57 Part 2 Rev.1
under Private key
A cryptographic key used with a public key cryptographic algorithm that is uniquely associated with an entity and is not made public. In an asymmetric (public) key cryptosystem, the private key is associated with a public key. Depending on the algorithm, the private key may be used to: 1. Compute the corresponding public key, 2. Compute a digital signature that may be verified by the corresponding public key, 3. Decrypt data that was encrypted by the corresponding public key, or 4. Compute a shared secret during a key-agreement process.
Sources:
NIST SP 800-175B Rev. 1
under Private key
A cryptographic key used with a public-key cryptographic algorithm that is uniquely associated with an entity and is not made public. In an asymmetric-key (public-key) cryptosystem, the private key has a corresponding public key. Depending on the algorithm, the private key may be used, for example, to: 1. Compute the corresponding public key, 2. Compute a digital signature that may be verified by the corresponding public key, 3. Decrypt keys that were encrypted by the corresponding public key, or 4. Compute a shared secret during a key-agreement transaction.
Sources:
NIST SP 800-57 Part 1 Rev. 5
under Private key
A cryptographic key used with an asymmetric-key (public-key) cryptographic algorithm that is not made public and is uniquely associated with an entity that is authorized to use it. In an asymmetric-key cryptosystem, the private key is associated with a public key. Depending on the algorithm that employs the private key, it may be used to:
1. Compute the corresponding public key;
2. Compute a digital signature that may be verified using the corresponding public key;
3. Decrypt data that was encrypted using the corresponding public key; or
4. Compute a key-derivation key, which may then be used as an input to a key-derivation process.
Sources:
NIST SP 800-133 Rev. 2
under Private key