The public part of an asymmetric key pair that is typically used to verify signatures or encrypt data.
Source(s):
FIPS 201 under Public Key [Withdrawn]
A cryptographic key that may be made public and is used with a public-key cryptographic algorithm. A public key is associated with a private key.
Source(s):
NIST SP 800-56B Rev. 1 under Public key
The public part of an asymmetric key pair that is used to verify signatures or encrypt data.
Source(s):
NIST SP 800-63-2 under Public Key [Superseded]
NIST SP 800-63-3 under Public Key
A cryptographic key used with an asymmetric-key (public-key) cryptographic algorithm that may be made public and is associated with a private key and an entity that is authorized to use that private key. Depending on the algorithm that employs the public key, it may be used to:
1. Verify a digital signature that is signed by the corresponding private key,
2. Encrypt data that can be decrypted by the corresponding private key, or
3. Compute a piece of shared data (i.e., data that is known only by two or more specific entities).
Source(s):
NIST SP 800-133 under Public key
A cryptographic key used by a public-key (asymmetric) cryptographic algorithm that may be made public.
Source(s):
NIST SP 800-152 under Public key
A cryptographic key used with a public key cryptographic algorithm that is uniquely associated with an entity and that may be made public.
Source(s):
NIST SP 800-12 Rev. 1 under Public Key
(FIPS 140-2)
A cryptographic key, used with a public-key cryptographic algorithm, that is uniquely associated with an entity and that may be made public. In an asymmetric (public) cryptosystem, the public key has a corresponding private key. The public key may be known by anyone and, depending on the algorithm, may be used, for example, to:
1. Verify a digital signature that is signed by the corresponding private key,
2. Encrypt keys that can be decrypted using the corresponding private key, or
3. Compute a shared secret during a key-agreement transaction.
Source(s):
NIST SP 800-57 Part 1 Rev. 4 under Public key
A mathematical key that has public availability and that applications use to verify signatures created with its corresponding private key. Depending on the algorithm, public keys can encrypt messages or files that the corresponding private key can decrypt.
Source(s):
CNSSI 4009-2015
(CNSSI 1300)
A cryptographic key, used with a public-key cryptographic algorithm, that is uniquely associated with an entity and that may be made public. In an asymmetric (public) cryptosystem, the public key is associated with a private key. The public key may be known by anyone and, depending on the algorithm, may be used, for example, to: 1. Verify a digital signature that is signed by the corresponding private key, 2. Encrypt keys that can be decrypted using the corresponding private key, or 3. Compute a shared secret during a key-agreement transaction.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 under Public key [Superseded]
A cryptographic key used with a public key cryptographic algorithm that is uniquely associated with an entity and that may be made public. In an asymmetric (public) cryptosystem, the public key is associated with a private key. The public key may be known by anyone and is used to:
1. Verify a digital signature that is signed by the corresponding private key,
2. Encrypt data that can be decrypted by the corresponding private key, or
3. Compute a piece of shared data.
Source(s):
NIST SP 800-57 Part 2 under Public key
A cryptographic key that is used with an asymmetric (public key) cryptographic algorithm and is associated with a private key. The public key is associated with an owner and may be made public. In the case of digital signatures, the public key is used to verify a digital signature that was signed by the corresponding private key.
Source(s):
NIST SP 800-89 under Public key
(1) The key of a signature key pair used to validate a digital signature. (2) The key ofan encryption key pair that is used to encrypt confidential information. In both cases, this key is made publicly available normally in the form of a digital certificate.
Source(s):
NIST SP 800-32 under Public Key