U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

public key cryptography (PKC)

Abbreviation(s) and Synonym(s):

asymmetric cryptography
Asymmetric-key cryptography
PKC
PKE

Definition(s):

  Encryption system that uses a public-private key pair for encryption and/or digital signature.
Source(s):
NIST SP 800-12 Rev. 1 under Public Key Cryptography from CNSSI 4009
CNSSI 4009-2015 [Superseded]

  Cryptography that uses separate keys for encryption and decryption; also known as asymmetric cryptography.
Source(s):
NIST SP 1800-16B under Public Key Cryptography from NIST SP 800-77
NIST SP 1800-16C under Public Key Cryptography from NIST SP 800-77
NIST SP 1800-16D under Public Key Cryptography from NIST SP 800-77
NIST SP 800-77 [Superseded] under Public Key Cryptography

  A form of cryptography that uses two related keys, a public key and a private key; the two keys have the property that, given the public key, it is computationally infeasible to derive the private key. For key establishment, public-key cryptography allows different parties to communicate securely without havng prior access to a secret key that is shared, by using one or more pairs (public key and private key) of cryptographic keys.
Source(s):
NIST SP 800-56B Rev. 2 under Public-key cryptography

  A cryptographic system where users have a private key that is kept secret and used to generate a public key (which is freely provided to others). Users can digitally sign data with their private key and the resulting signature can be verified by anyone using the corresponding public key. Also known as a Public-key cryptography.
Source(s):
NISTIR 8202 under Asymmetric-key cryptography

  See Asymmetric-key cryptography.
Source(s):
NISTIR 8202 under Public key cryptography

  See public key cryptography (PKC).
Source(s):
CNSSI 4009-2015 [Superseded] under asymmetric cryptography

  A form of cryptography that uses two related keys, a public key and a private key; the two keys have the property that, given the public key, it is computationally infeasible to derive the private key. For key establishment, public-key cryptography allows different parties to communicate securely without having prior access to a secret key that is shared, by using one or more pairs (public key and private key) of cryptographic keys.
Source(s):
NIST SP 800-56B Rev. 1 [Superseded] under Public-key cryptography