File:Public key encryption.svg

Original file (SVG file, nominally 525 × 513 pixels, file size: 25 KB)

Render this image in .

Summary

Description

Public-key cryptography / asymmetric cryptography, encryption. Anyone can encrypt using the public key, but only the holder of the private key can decrypt. Security depends on the secrecy of the private key.

Original illustration by David Göthberg, Sweden.

Released by David as public domain.
Date
Source Own work
Author Davidgothberg
Other versions

This image is part in a series of images showing the four basic public-key cryptography operations: Creating a key pair, encrypting, signing, and creating a shared secret. Note that no single cryptosystem can do all three operations: For instance RSA can do encryption and signing, while Diffie–Hellman can create shared secrets.

See Category:Cryptography diagrams for several related diagrams.
SVG development
InfoField
 
The SVG code is valid.
 
This diagram was created with Inkscape…important.
 
 This diagram uses embedded text that can be easily translated using a text editor.

Licensing

Public domain I, the copyright holder of this work, release this work into the public domain. This applies worldwide.
In some countries this may not be legally possible; if so:
I grant anyone the right to use this work for any purpose, without any conditions, unless such conditions are required by law.

Captions

Add a one-line explanation of what this file represents

Items portrayed in this file

depicts

7 August 2006

image/svg+xml

25,143 byte

1308885e9fdc7f2985fb4c28fd647bc3eb76300f

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current18:00, 19 October 2024Thumbnail for version as of 18:00, 19 October 2024525 × 513 (25 KB)GKNishimotoFile uploaded using svgtranslate tool (https://svgtranslate.toolforge.org/). Added translation for pt-br.
11:29, 2 August 2018Thumbnail for version as of 11:29, 2 August 2018525 × 513 (20 KB)FlippyFlinkAligned name Bob and Alice with (portable) Inkscape editor.
08:36, 7 July 2017Thumbnail for version as of 08:36, 7 July 2017525 × 513 (20 KB)WinstonleeReverted to version as of 21:11, 21 August 2006 (UTC)
06:04, 6 July 2017Thumbnail for version as of 06:04, 6 July 2017525 × 513 (20 KB)WinstonleeTypically Alice wants to send message to Bob using Bob's public key, instead of the reverse.
21:11, 21 August 2006Thumbnail for version as of 21:11, 21 August 2006525 × 513 (20 KB)DavidgothbergImproved image.
19:02, 21 August 2006Thumbnail for version as of 19:02, 21 August 2006544 × 513 (20 KB)DavidgothbergImproved image.
07:42, 7 August 2006Thumbnail for version as of 07:42, 7 August 2006530 × 400 (15 KB)DavidgothbergPublic-key cryptography / asymmetric cryptography, encryption. A message that is encrypted with the public key can only be decrypted with the secret key. The public key can NOT decrypt the message. This means any one can send encrypted messages to the ow

Global file usage

The following other wikis use this file:

Metadata

  NODES
INTERN 3
Note 1