U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

public key

Definition(s):

  The public part of an asymmetric key pair that is typically used to verify signatures or encrypt data.
Source(s):
FIPS 201-3 under Public Key
NIST SP 1800-12b
FIPS 201 [version unknown] under Public Key

  A cryptographic key used with a public key cryptographic algorithm that is uniquely associated with an entity and that may be made public.
Source(s):
NIST SP 800-12 Rev. 1 under Public Key from FIPS 140-2

  A cryptographic key used by a public-key (asymmetric) cryptographic algorithm that may be made public.
Source(s):
NIST SP 800-152 under Public key

  A cryptographic key that may be made public and is used with a public-key cryptographic algorithm. A public key is associated with a private key.
Source(s):
NIST SP 800-56B Rev. 2 under Public key
NIST SP 800-56B Rev. 1 [Superseded] under Public key

  The public part of an asymmetric key pair that is used to verify signatures or encrypt data.
Source(s):
NIST SP 1800-16B under Public Key from NIST SP 800-63-3
NIST SP 1800-16C under Public Key from NIST SP 800-63-3
NIST SP 1800-16D under Public Key from NIST SP 800-63-3
NIST SP 1800-17b under Public Key
NIST SP 1800-17c under Public Key
NIST SP 800-63-3 under Public Key
NIST SP 800-63-2 [Superseded] under Public Key

  A cryptographic key that is used with an asymmetric (public key) cryptographic algorithm and is associated with a private key. The public key is associated with an owner and may be made public. In the case of digital signatures, the public key is used to verify a digital signature that was signed by the corresponding private key.
Source(s):
NIST SP 800-89 under Public key

  A cryptographic key used with a public-key cryptographic algorithm that is uniquely associated with an entity and that may be made public. The public key has a corresponding private key. The public key may be known by anyone and, depending on the algorithm, may be used: 1. To verify a digital signature that is signed by the corresponding private key, 2. To encrypt keys that can be decrypted using corresponsing private key, or 3. As on of the input values to compute a shared secret during a key agreement transaction.
Source(s):
NIST SP 800-57 Part 2 Rev.1 under Public key

  A cryptographic key used with a public-key (asymmetric-key) algorithm that is uniquely associated with an entity and that may be made public. In an asymmetric (public) key cryptosystem, the public key is associated with a private key. The public key may be known by anyone and, depending on the algorithm, may be used to 1. Verify a digital signature that is signed by the corresponding private key, 2. Encrypt data that can be decrypted by the corresponding private key, or 3. Compute a shared secret during a key-agreement process.
Source(s):
NIST SP 800-175B Rev. 1 under Public key

  A cryptographic key used with a public-key cryptographic algorithm that is uniquely associated with an entity and that may be made public. In an asymmetric-key (public-key) cryptosystem, the public key has a corresponding private key. The public key may be known by anyone and, depending on the algorithm, may be used, for example, to: 1. Verify a digital signature that was generated using the corresponding private key, 2. Encrypt keys that can be decrypted using the corresponding private key, or 3. Compute a shared secret during a key-agreement transaction.
Source(s):
NIST SP 800-57 Part 1 Rev. 5 under Public key

  A cryptographic key used with an asymmetric-key (public-key) cryptographic algorithm that may be made public and is associated with a private key and an entity that is authorized to use that private key. Depending on the algorithm that employs the public key, it may be used to: 1. Verify a digital signature that is signed by the corresponding private key; 2. Encrypt data that can be decrypted by the corresponding private key; or 3. Compute a piece of shared data (i.e., data that is known only by two or more specific entities).
Source(s):
NIST SP 800-133 Rev. 2 under Public key

  A mathematical key that has public availability and that applications use to verify signatures created with its corresponding private key. Depending on the algorithm, public keys can encrypt messages or files that the corresponding private key can decrypt.
Source(s):
CNSSI 4009-2015 [Superseded] from CNSSI 1300

  A cryptographic key used with an asymmetric-key (public-key) cryptographic algorithm that may be made public and is associated with a private key and an entity that is authorized to use that private key. Depending on the algorithm that employs the public key, it may be used to: 1. Verify a digital signature that is signed by the corresponding private key, 2. Encrypt data that can be decrypted by the corresponding private key, or 3. Compute a piece of shared data (i.e., data that is known only by two or more specific entities).
Source(s):
NIST SP 800-133 [Superseded] under Public key

  (1) The key of a signature key pair used to validate a digital signature. (2) The key ofan encryption key pair that is used to encrypt confidential information. In both cases, this key is made publicly available normally in the form of a digital certificate.
Source(s):
NIST SP 800-32 [Withdrawn] under Public Key

  A cryptographic key, used with a public-key cryptographic algorithm, that is uniquely associated with an entity and that may be made public. In an asymmetric (public) cryptosystem, the public key is associated with a private key. The public key may be known by anyone and, depending on the algorithm, may be used, for example, to: 1. Verify a digital signature that is signed by the corresponding private key, 2. Encrypt keys that can be decrypted using the corresponding private key, or 3. Compute a shared secret during a key-agreement transaction.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 [Superseded] under Public key

  A cryptographic key used with an asymmetric-key (public-key) cryptographic algorithm that may be made public and is associated with a private key and an entity that is authorized to use that private key. Depending on the algorithm that employs the public key, it may be used to: 1. Verify a digital signature that is signed by the corresponding private key, 2. Encrypt data that can be decrypted by the corresponding private key, or 3. Compute a piece of shared data (i.e., data that is known only by two or more specific entities).
Source(s):
NIST SP 800-133 Rev.1 [Superseded] under Public key

  A cryptographic key used with a public key cryptographic algorithm that is uniquely associated with an entity and that may be made public. In an asymmetric (public) cryptosystem, the public key is associated with a private key. The public key may be known by anyone and is used to: 1. Verify a digital signature that is signed by the corresponding private key, 2. Encrypt data that can be decrypted by the corresponding private key, or 3. Compute a piece of shared data.
Source(s):
NIST SP 800-57 Part 2 [Superseded] under Public key

  A cryptographic key, used with a public-key cryptographic algorithm, that is uniquely associated with an entity and that may be made public. In an asymmetric (public) cryptosystem, the public key has a corresponding private key. The public key may be known by anyone and, depending on the algorithm, may be used, for example, to: 1. Verify a digital signature that is signed by the corresponding private key, 2. Encrypt keys that can be decrypted using the corresponding private key, or 3. Compute a shared secret during a key-agreement transaction.
Source(s):
NIST SP 800-57 Part 1 Rev. 4 [Superseded] under Public key