File:Asymmetric cryptography - step 2.svg
Original file (SVG file, nominally 850 × 570 pixels, file size: 51 KB)
Captions
Summary
[edit]DescriptionAsymmetric cryptography - step 2.svg |
English: Asymmetric cryptography. Steps 2 & 3 : Bob ciphers the message with Alice's public key. Alice gets the ciphertext and uses her private key to recover the text. |
Date | |
Source | |
Author | Tomasz "odder" Kozlowski |
SVG development InfoField | This vector image was created with Inkscape. |
Licensing
[edit]Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled GNU Free Documentation License.http://www.gnu.org/copyleft/fdl.htmlGFDLGNU Free Documentation Licensetruetrue |
This file is licensed under the Creative Commons Attribution-Share Alike 3.0 Unported license. | ||
| ||
This licensing tag was added to this file as part of the GFDL licensing update.http://creativecommons.org/licenses/by-sa/3.0/CC BY-SA 3.0Creative Commons Attribution-Share Alike 3.0truetrue |
- You are free:
- to share – to copy, distribute and transmit the work
- to remix – to adapt the work
- Under the following conditions:
- attribution – You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- share alike – If you remix, transform, or build upon the material, you must distribute your contributions under the same or compatible license as the original.
This work is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or any later version. This work is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of merchantability or fitness for a particular purpose. See version 2 and version 3 of the GNU General Public License for more details.http://www.gnu.org/licenses/gpl.htmlGPLGNU General Public Licensetruetrue |
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 13:09, 20 March 2007 | 850 × 570 (51 KB) | Odder (talk | contribs) | {{inkscape}} {{Information |Description={{en|Asymetric cryptography. Steps 2 & 3 : Bob ciphers the message with Alice's public key. Alice gets the ciphertext and uses her private key to recover the text.}} |Source=own work, based on png version originally |
You cannot overwrite this file.
File usage on Commons
The following page uses this file:
- File:Asymetric cryptography - step 2.svg (file redirect)
File usage on other wikis
The following other wikis use this file:
- Usage on ca.wikipedia.org
- Usage on en.wikibooks.org
- Usage on en.wikiversity.org
- Usage on es.wikipedia.org
- Usage on fr.wikipedia.org
- Usage on fr.wikibooks.org
- Usage on fr.wiktionary.org
- Usage on it.wikipedia.org
- Usage on kk.wikipedia.org
- Usage on nl.wikipedia.org
- Usage on pl.wikipedia.org
- Usage on pt.wikipedia.org
- Usage on ru.wikipedia.org
- Usage on zh.wikipedia.org
Metadata
This file contains additional information such as Exif metadata which may have been added by the digital camera, scanner, or software program used to create or digitize it. If the file has been modified from its original state, some details such as the timestamp may not fully reflect those of the original file. The timestamp is only as accurate as the clock in the camera, and it may be completely wrong.
Width | 850 |
---|---|
Height | 570 |