File:Asymmetric cryptography - step 2.svg

From Wikimedia Commons, the free media repository
Jump to navigation Jump to search

Original file (SVG file, nominally 850 × 570 pixels, file size: 51 KB)

Captions

Captions

Add a one-line explanation of what this file represents

Summary

[edit]
Description
English: Asymmetric cryptography. Steps 2 & 3 : Bob ciphers the message with Alice's public key. Alice gets the ciphertext and uses her private key to recover the text.
Date
Source
English: Own work, based on png version originally uploaded to the Commons by Dake.
Author Tomasz "odder" Kozlowski
SVG development
InfoField
 
The SVG code is valid.
 
This vector image was created with Inkscape.

Licensing

[edit]
I, the copyright holder of this work, hereby publish it under the following licenses:
GNU head Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled GNU Free Documentation License.
w:en:Creative Commons
attribution share alike
This file is licensed under the Creative Commons Attribution-Share Alike 3.0 Unported license.
You are free:
  • to share – to copy, distribute and transmit the work
  • to remix – to adapt the work
Under the following conditions:
  • attribution – You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
  • share alike – If you remix, transform, or build upon the material, you must distribute your contributions under the same or compatible license as the original.
This licensing tag was added to this file as part of the GFDL licensing update.
w:en:Creative Commons
attribution share alike
This file is licensed under the Creative Commons Attribution-Share Alike 2.5 Generic license.
You are free:
  • to share – to copy, distribute and transmit the work
  • to remix – to adapt the work
Under the following conditions:
  • attribution – You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
  • share alike – If you remix, transform, or build upon the material, you must distribute your contributions under the same or compatible license as the original.
GNU head

This work is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or any later version. This work is distributed in the hope that it will be useful, but without any warranty; without even the implied warranty of merchantability or fitness for a particular purpose. See version 2 and version 3 of the GNU General Public License for more details.

You may select the license of your choice.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current13:09, 20 March 2007Thumbnail for version as of 13:09, 20 March 2007850 × 570 (51 KB)Odder (talk | contribs){{inkscape}} {{Information |Description={{en|Asymetric cryptography. Steps 2 & 3 : Bob ciphers the message with Alice's public key. Alice gets the ciphertext and uses her private key to recover the text.}} |Source=own work, based on png version originally

The following page uses this file:

File usage on other wikis

The following other wikis use this file:

Metadata