Tech moves fast! Stay ahead of the curve with Techopedia!
Join nearly 200,000 subscribers who receive actionable tech insights from Techopedia.
A public key is created in public key encryption cryptography that uses asymmetric-key encryption algorithms. Public keys are used to convert a message into an unreadable format. Decryption is carried out using a different, but matching, private key. Public and private keys are paired to enable secure communication.
A public key may be placed in an open access directory for decryption of the digital signature of the sender, the public key of the message recipient encrypts the sender’s message. Public key infrastructure (PKI) produces public and private keys.
The open access public key may also be e-mailed to trusted contacts and users. Pretty Good Privacy (PGP) is a popular form of public key cryptography. Public PGP keys are housed in a public key server directory to allow public key sharing. PGP server directory keys may be updated but not removed.
Do you work in the tech industry? Help us learn more about why the gender gap still exists in tech by taking this quick survey! Survey respondents will also be entered to win a $100 Amazon Gift Card!
Join nearly 200,000 subscribers who receive actionable tech insights from Techopedia.