File:Public key encryption.svg

Summary

Description

Public-key cryptography / asymmetric cryptography, encryption. Anyone can encrypt using the public key, but only the holder of the private key can decrypt. Security depends on the secrecy of the private key.

Original illustration by David Göthberg, Sweden.

Released by David as public domain.
Date
Source Own work
Author Davidgothberg
Other versions

This image is part in a series of images showing the four basic public-key cryptography operations: Creating a key pair, encrypting, signing, and creating a shared secret. Note that no single cryptosystem can do all three operations: For instance RSA can do encryption and signing, while Diffie–Hellman can create shared secrets.

See Category:Cryptography diagrams for several related diagrams.
SVG development
InfoField

Licensing

Public domain I, the copyright holder of this work, release this work into the public domain. This applies worldwide.
In some countries this may not be legally possible; if so:
I grant anyone the right to use this work for any purpose, without any conditions, unless such conditions are required by law.
Category:Self-published work#Public%20key%20encryption.svgCategory:PD-self#Public%20key%20encryption.svg Category:Public-key cryptography Category:English-language SVG diagrams Category:SVG cryptography diagrams
Category:English-language SVG diagrams Category:PD-self Category:Public-key cryptography Category:SVG created with Inkscape:Important Category:SVG cryptography diagrams Category:Self-published work Category:Translation possible - SVG Category:Valid SVG created with Inkscape:Diagrams