Introduction
History
How it Works
Applications
Key Verification
Future
See Also
Those Involved
Bibliography
Glossary
References
Group Members
To Do
Encrypt Data
Q & A
Search:  
Public Key Encryption
Glossary

Asymmetric Encryption Encryption were the message is encrypted and decrypted using a pair of keys.
Certificate A digitally signed statement that contains information about an entity and the entity's public key, thus binding these two pieces of information together.
Certificate Authority (CA) An entity entrusted to issue certificates asserting that the recipient individual, machine or organization requesting the certificate fulfills the conditions of an established policy.
Cipher-Text Text which has been encrypted.
Cipher A cryptographic system in which units of plain text of regular length, usually letters, are arbitrarily transposed or substituted according to a predetermined code.
Cryptography A study of techniques and applications of encryption.
Decrypt To decipher or decode a message.
Digital Signature The digital equivalent of an authentic, handwritten signature.
Encrypt To alter (a file, for example) using a secret code so as to be unintelligible to unauthorized parties.
GCHQ Government Communications Headquarters. http://www.gchq.gov.uk/
MIT Massachusetts Institute of Technology. http://web.mit.edu/
NSE Non Secret Encryption.
PKE See Public Key Encryption
Pretty Good Privacy (PGP) A program, developed by Phil Zimmerman, that uses cryptography to protect files and electronic mail from being read by others.
Private Key In Public Key Encryption, this key is kept private.
Public Key In Public Key Encryption, this key is made available.
Public Key Encryption An asymetric method of encoding data where one of the keys is made public and the other is kept private.
Quantum Computer An immensely powerful computer that exploits quantum theory, in particular the theory that an object can be in many states at once.
Qubit A quantum bit.
RSA An encryption and authentication system that uses an algorithm developed in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman.
Secure Shell A completely encrypted shell connection between two machines.
Secure Sockets Layer (SSL) The Secure Sockets Layer (SSL) protocol is a strong authentication system which provides confidentiality, integrity, and optionally authentication at the transport level.
S-HTTP An extension to HTTP which allows secure (encrypted) data transmissions over the world wide web.
Symmetric Encryption Encryption were the message is encrypted and decrypted using the same key.
Verisign A leading provider of Public Key Infrastructure. http://verisign.com/