U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

public key cryptographic algorithm

Abbreviation(s) and Synonym(s):

Asymmetric key algorithm
Asymmetric-key algorithm

Definition(s):

  See Asymmetric-key algorithm.
Source(s):
NIST SP 800-133 Rev. 2 under Public-key algorithm
NIST SP 800-133 [Superseded] under Public-key algorithm
NIST SP 800-133 Rev.1 [Superseded] under Public-key algorithm

  A cryptographic algorithm that uses two related keys, a public key and a private key. The two keys have the property that determining the private key from the public key is computationally infeasible.
Source(s):
NIST SP 800-57 Part 2 Rev.1 under Public-key (asymmetric) cryptographic algorithm
NIST SP 800-56B Rev. 1 [Superseded] under Public-key algorithm
NIST SP 800-57 Part 2 [Superseded] under Public key (asymmetric) cryptographic algorithm

  See Public-key cryptographic algorithm.
Source(s):
NIST SP 800-57 Part 1 Rev. 5 under Asymmetric-key algorithm
NIST SP 800-57 Part 1 Rev. 3 [Superseded] under Asymmetric key algorithm
NIST SP 800-57 Part 1 Rev. 4 [Superseded] under Asymmetric key algorithm

  A cryptographic algorithm that uses two related keys: a public key and a private key. The two keys have the property that determining the private key from the public key is computationally infeasible.
Source(s):
NIST SP 800-175B Rev. 1 under Public key (asymmetric-key) cryptographic algorithm
NIST SP 800-56B Rev. 2 under Public-key algorithm
NIST SP 800-57 Part 1 Rev. 5 under Public-key (asymmetric-key) cryptographic algorithm
NIST SP 800-57 Part 1 Rev. 3 [Superseded] under Public-key (asymmetric) cryptographic algorithm
NIST SP 800-57 Part 1 Rev. 4 [Superseded] under Public-key (asymmetric) cryptographic algorithm

  See public-key algorithm.
Source(s):
NIST SP 800-175B Rev. 1 under Asymmetric-key algorithm

  A cryptographic algorithm that uses two related keys: a public key and a private key. The two keys have the property that determining the private key from the public key is computationally infeasible; also known as a public-key algorithm.
Source(s):
NIST SP 800-133 Rev. 2 under Asymmetric-key algorithm

  A cryptographic algorithm that uses two related keys, a public key and a private key. The two keys have the property that determining the private key from the public key is computationally infeasible. Also known as a public-key algorithm.
Source(s):
NIST SP 800-133 [Superseded] under Asymmetric-key algorithm
NIST SP 800-133 Rev.1 [Superseded] under Asymmetric-key algorithm

  See Public key cryptographic algorithm.
Source(s):
NIST SP 800-57 Part 2 [Superseded] under Asymmetric key algorithm