File:Public key encryption.svg
Summary
| Description |
Public-key cryptography / asymmetric cryptography, encryption. Anyone can encrypt using the public key, but only the holder of the private key can decrypt. Security depends on the secrecy of the private key. Original illustration by David Göthberg, Sweden. Released by David as public domain. |
| Date | |
| Source | Own work |
| Author | Davidgothberg |
| Other versions |
This image is part in a series of images showing the four basic public-key cryptography operations: Creating a key pair, encrypting, signing, and creating a shared secret. Note that no single cryptosystem can do all three operations: For instance RSA can do encryption and signing, while Diffie–Hellman can create shared secrets. |
| SVG development | Category:Valid SVG created with Inkscape:Diagrams#Public%20key%20encryption.svg |
Licensing
| I, the copyright holder of this work, release this work into the public domain. This applies worldwide. In some countries this may not be legally possible; if so: I grant anyone the right to use this work for any purpose, without any conditions, unless such conditions are required by law. |