Public key cryptography is a method to encrypt messages using a non-secret key. The term public key cryptography also includes various others cryptographic methods using a non-secret key, such as Authentication, Digital Signature Schemes, and Key Agreement. In this section, public key encryption schemes are described.
Conventional cryptography, also known as Symmetric Cryptosystem, uses a secret key to encrypt a message; the same key is required to decrypt the encrypted message. Therefore, the sender and the receiver of encrypted message either had to agree on the secret key before encrypting the message, or the receiver had to learn the secret key before decrypting it. The same secret key could not be used when sending a message to a different receiver. How to manage secret keys was a serious problem before public key cryptosystem was invented.
This is a preview of subscription content, access via your institution.
Tax calculation will be finalised at checkout
Purchases are for personal use onlyLearn about institutional subscriptions
Diffie W, Hellman ME (1976) New Directions in Cryptography. IEEE T Inform Theory Vol. IT-22, No. 6:644–654
Editors and Affiliations
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Sako, K. (2011). Public Key Cryptography. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_22
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5