Original file(SVG file, nominally 560 × 510 pixels, file size: 21 KB)

Summary

Description

Public-key cryptography / asymmetric cryptography, signing. A message that is signed (encrypted) with the private key can be verified (decrypted) with the public key. Since the public key is public, anyone can verify the signature. The public key cannot create such signatures. Security depends on the secrecy of the private key.

Original illustration by David Göthberg, Sweden.

Released by David as public domain.
Date
Source Own work
Author Davidgothberg
Other versions

This image is part in a series of images showing the four basic public-key cryptography operations: Creating a key pair, encrypting, signing, and creating a shared secret. Note that no single cryptosystem can do all three operations: For instance RSA can do encryption and signing, while Diffie–Hellman can create shared secrets.

See Category:Cryptography diagrams for several related diagrams.
SVG development
InfoField
 
The source code of this SVG is invalid due to 56 errors.
 
This W3C-invalid diagram was created with Inkscape…important.
 
 This diagram uses embedded text that can be easily translated using a text editor.

Licensing

Public domain I, the copyright holder of this work, release this work into the public domain. This applies worldwide.
In some countries this may not be legally possible; if so:
I grant anyone the right to use this work for any purpose, without any conditions, unless such conditions are required by law.

Captions

Add a one-line explanation of what this file represents

Items portrayed in this file

depicts

7 August 2006

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current19:15, 21 August 2006Thumbnail for version as of 19:15, 21 August 2006560 × 510 (21 KB)DavidgothbergImproved image.
08:37, 7 August 2006Thumbnail for version as of 08:37, 7 August 2006540 × 400 (14 KB)DavidgothbergPublic-key cryptography / asymmetric cryptography, signing. A message that is signed (encrypted) with the secret key can be verified (decrypted) with the public key. Since the public key is public any one can verify the signature. The public key can not

Global file usage

The following other wikis use this file: