File:Public key shared secret.svg
Original file (SVG file, nominally 581 × 650 pixels, file size: 28 KB)
Captions
Summary
[edit]DescriptionPublic key shared secret.svg |
Public-key cryptography / asymmetric cryptography, shared secret agreement. Alice combines her own private key with Bob's public key to create a shared secret. Likewise Bob combines his own private key with Alice's public key and gets the same shared secret. This secret is now only known by Alice and Bob. The shared secret can be used as a symmetric key for encrypted communication between Alice and Bob and for many other purposes such as MACing and to create multiple message keys etc. Diffie–Hellman key exchange is a method of this type. Original illustration by David Göthberg, Sweden. Released by David as public domain. |
Date | |
Source | Own work |
Author | Davidgothberg |
Other versions |
This image is part in a series of images showing the four basic public-key cryptography operations: Creating a key pair, encrypting, signing, and creating a shared secret. Note that no single cryptosystem can do all three operations: For instance RSA can do encryption and signing, while Diffie–Hellman can create shared secrets. |
SVG development InfoField | This W3C-invalid diagram was created with Inkscape…important. This diagram is translated using SVG switch elements: all translations are stored in the same file. |
Licensing
[edit]Public domainPublic domainfalsefalse |
I, the copyright holder of this work, release this work into the public domain. This applies worldwide. In some countries this may not be legally possible; if so: I grant anyone the right to use this work for any purpose, without any conditions, unless such conditions are required by law. |
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 15:19, 7 July 2017 | 581 × 650 (28 KB) | Winstonlee (talk | contribs) | enable chinese language | |
21:02, 21 August 2006 | 581 × 650 (24 KB) | Davidgothberg (talk | contribs) | Improved image. | ||
08:39, 7 August 2006 | 581 × 650 (21 KB) | Davidgothberg (talk | contribs) | Public-key cryptography / asymmetric cryptography, shared secret agreement. Alice combines her own secret key with Bob's public key to create a shared secret. Likewise Bob combines his own secret key with Alice's public key and gets the same shared secre |
You cannot overwrite this file.
File usage on Commons
The following 4 pages use this file:
File usage on other wikis
The following other wikis use this file:
- Usage on ca.wikipedia.org
- Usage on de.wikipedia.org
- Usage on en.wikipedia.org
- Usage on es.wikipedia.org
- Usage on hy.wikipedia.org
- Usage on ja.wikipedia.org
- Usage on kk.wikipedia.org
- Usage on ml.wikipedia.org
- Usage on pt.wikipedia.org
- Usage on ru.wikipedia.org
- Usage on th.wikipedia.org
- Usage on tr.wikipedia.org
- Usage on zh.wikipedia.org
Metadata
This file contains additional information such as Exif metadata which may have been added by the digital camera, scanner, or software program used to create or digitize it. If the file has been modified from its original state, some details such as the timestamp may not fully reflect those of the original file. The timestamp is only as accurate as the clock in the camera, and it may be completely wrong.
Width | 581.25000 |
---|---|
Height | 650.00000 |