Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

private key

Definitions:

  The secret part of an asymmetric key pair that is typically used to digitally sign or decrypt data.
Sources:
FIPS 201-3 under Private Key

  A cryptographic key that is used with an asymmetric (public key) cryptographic algorithm. The private key is uniquely associated with the owner and is not made public. The private key is used to compute a digital signature that may be verified using the corresponding public key.
Sources:
FIPS 186-5 under Private key

  A cryptographic key that is used with an asymmetric (public-key) cryptographic algorithm. The private key is uniquely associated with the owner and is not made public. The private key is used to compute a digital signature that may be verified using the corresponding public key.
Sources:
FIPS 204

  A cryptographic key that is used with an asymmetric (public-key) cryp­tographic algorithm. The private key is uniquely associated with the owner and is not made public. The private key is used to compute a digital signature that may be verified using the corresponding public key.
Sources:
FIPS 205 from FIPS 186-5

  A mathematical key (kept secret by the holder) used to create digital signatures and, depending upon the algorithm, to decrypt messages or files encrypted (for confidentiality) with the corresponding public key.
Sources:
CNSSI 4009-2015 from CNSSI 1300

  A cryptographic key, used with a public key cryptographic algorithm, that is uniquely associated with an entity and is not made public.
Sources:
NIST SP 800-12 Rev. 1 under Private Key from FIPS 140-2

  A cryptographic key used by a public-key (asymmetric) cryptographic algorithm that is uniquely associated with an entity and is not made public.
Sources:
NIST SP 800-152 under Private key

  A cryptographic key that is kept secret and is used with a public-key cryptographic algorithm. A private key is associated with a public key.
Sources:
NIST SP 800-56B Rev. 2 under Private key

  The secret part of an asymmetric key pair that is used to digitally sign or decrypt data.
Sources:
NIST SP 1800-16B under Private Key from NIST SP 800-63-3
NIST SP 1800-16C under Private Key from NIST SP 800-63-3
NIST SP 1800-16D under Private Key from NIST SP 800-63-3
NIST SP 1800-17b under Private Key
NIST SP 1800-17c under Private Key
NIST SP 800-63-3 under Private Key

  The secret part of an asymmetric key pair that is typically used to digitally sign or decrypt data.
Sources:
NIST SP 1800-12b

  A cryptographic key that is used with an asymmetric (public key) cryptographic algorithm. For digital signatures, the private key is uniquely associated with the owner and is not made public. The private key is used to compute a digital signature that may be verified by the corresponding public key.
Sources:
NIST SP 800-89 under Private key

  A cryptographic key used with a public-key cryptographic algorithm that is uniquely associated with an entity and is not made public. The private key has a corresponding public key. Depending on the algorithm, the private key may be used to: 1. Compute the corresponding public key, 2. Compute a digital signautre taht may be verified by the corresponding public key, 3. Decrypt keys that were encrypted by the corresponding public key, or 4. Compute a shared secret that during a key agreement transaction.
Sources:
NIST SP 800-57 Part 2 Rev.1 under Private key

  A cryptographic key used with a public key cryptographic algorithm that is uniquely associated with an entity and is not made public. In an asymmetric (public) key cryptosystem, the private key is associated with a public key. Depending on the algorithm, the private key may be used to: 1. Compute the corresponding public key, 2. Compute a digital signature that may be verified by the corresponding public key, 3. Decrypt data that was encrypted by the corresponding public key, or 4. Compute a shared secret during a key-agreement process.
Sources:
NIST SP 800-175B Rev. 1 under Private key

  A cryptographic key used with a public-key cryptographic algorithm that is uniquely associated with an entity and is not made public. In an asymmetric-key (public-key) cryptosystem, the private key has a corresponding public key. Depending on the algorithm, the private key may be used, for example, to: 1. Compute the corresponding public key, 2. Compute a digital signature that may be verified by the corresponding public key, 3. Decrypt keys that were encrypted by the corresponding public key, or 4. Compute a shared secret during a key-agreement transaction.
Sources:
NIST SP 800-57 Part 1 Rev. 5 under Private key

  A cryptographic key used with an asymmetric-key (public-key) cryptographic algorithm that is not made public and is uniquely associated with an entity that is authorized to use it. In an asymmetric-key cryptosystem, the private key is associated with a public key. Depending on the algorithm that employs the private key, it may be used to: 1. Compute the corresponding public key; 2. Compute a digital signature that may be verified using the corresponding public key; 3. Decrypt data that was encrypted using the corresponding public key; or 4. Compute a key-derivation key, which may then be used as an input to a key-derivation process.
Sources:
NIST SP 800-133 Rev. 2 under Private key