Original file (915 × 1,024 pixels, file size: 93 KB, MIME type: image/png)
Summary
Summary
Description |
Public-key cryptography / asymmetric cryptography, shared secret agreement. Alice combines her own private key with Bob's public key to create a shared secret. Likewise Bob combines his own private key with Alice's public key and gets the same shared secret. This secret is now only known by Alice and Bob. The shared secret can be used as a symmetric key for encrypted communication between Alice and Bob and for many other purposes such as MACing and to create multiple message keys etc. Diffie–Hellman key exchange is a method of this type. Original illustration by David Göthberg, Sweden. Released by David as public domain. |
---|---|
Source |
Own work |
Date |
2006-08-07 |
Author | |
Permission (Reusing this file) |
See below. |
Other versions | This image is part in a series of images showing the four basic public-key cryptography operations: Creating a key pair, encrypting, signing, and creating a shared secret. Note that no single cryptosystem can do all three operations: For instance RSA can do encryption and signing, while Diffie–Hellman can create shared secrets.
See + for several related diagrams. |
Licensing
This file is in the public domain, because (no reason given!)
Please verify that the reason given above is valid! Note: if there is a specific licence tag for the reason supplied here, please use it. |
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 17:13, 10 April 2024 | 915 × 1,024 (93 KB) | Isidore (talk | contribs) | == {{int:filedesc}} == {{Information |description = Public-key cryptography / asymmetric cryptography, shared secret agreement. Alice combines her own private key with Bob's public key to create a shared secret. Likewise Bob combines his own private key with Alice's public key and gets the same shared secret. This secret is now only known by Alice and Bob. The shared secret can be used as a symmetric key for encrypted communication between Alice and Bob and for many other purposes such as MA... |
You cannot overwrite this file.
File usage
The following page uses this file: