U.S. flag   An unofficial archive of your favorite United States government website
This is an archive
(replace .gov by .rip)
A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

public key

Abbreviation(s) and Synonym(s):

None

Definition(s):

  A mathematical key that has public availability and that applications use to verify signatures created with its corresponding private key. Depending on the algorithm, public keys can encrypt messages or files that the corresponding private key can decrypt.
Source(s):
CNSSI 4009-2015 CNSSI 1300

  A cryptographic key used with a public key cryptographic algorithm that is uniquely associated with an entity and that may be made public.
Source(s):
NIST SP 800-12 Rev. 1 under Public Key FIPS 140-2

  The public part of an asymmetric key pair that is typically used to verify signatures or encrypt data.
Source(s):
NIST SP 1800-12b
FIPS 201 under Public Key [version unknown]

  A cryptographic key used with an asymmetric-key (public-key) cryptographic algorithm that may be made public and is associated with a private key and an entity that is authorized to use that private key. Depending on the algorithm that employs the public key, it may be used to: 1. Verify a digital signature that is signed by the corresponding private key, 2. Encrypt data that can be decrypted by the corresponding private key, or 3. Compute a piece of shared data (i.e., data that is known only by two or more specific entities).
Source(s):
NIST SP 800-133 under Public key [Superseded]

  A cryptographic key used by a public-key (asymmetric) cryptographic algorithm that may be made public.
Source(s):
NIST SP 800-152 under Public key

  (1) The key of a signature key pair used to validate a digital signature. (2) The key ofan encryption key pair that is used to encrypt confidential information. In both cases, this key is made publicly available normally in the form of a digital certificate.
Source(s):
NIST SP 800-32 under Public Key

  A cryptographic key that may be made public and is used with a public-key cryptographic algorithm. A public key is associated with a private key.
Source(s):
NIST SP 800-56B Rev. 2 under Public key
NIST SP 800-56B Rev. 1 under Public key [Superseded]

  The public part of an asymmetric key pair that is used to verify signatures or encrypt data.
Source(s):
NIST SP 1800-17b under Public Key
NIST SP 1800-17c under Public Key
NIST SP 800-63-3 under Public Key
NIST SP 800-63-2 under Public Key [Superseded]

  A cryptographic key that is used with an asymmetric (public key) cryptographic algorithm and is associated with a private key. The public key is associated with an owner and may be made public. In the case of digital signatures, the public key is used to verify a digital signature that was signed by the corresponding private key.
Source(s):
NIST SP 800-89 under Public key

  A cryptographic key used with an asymmetric-key (public-key) cryptographic algorithm that may be made public and is associated with a private key and an entity that is authorized to use that private key. Depending on the algorithm that employs the public key, it may be used to: 1. Verify a digital signature that is signed by the corresponding private key, 2. Encrypt data that can be decrypted by the corresponding private key, or 3. Compute a piece of shared data (i.e., data that is known only by two or more specific entities).
Source(s):
NIST SP 800-133 Rev.1 under Public key [Superseded]

  A cryptographic key used with a public key cryptographic algorithm that is uniquely associated with an entity and that may be made public. In an asymmetric (public) cryptosystem, the public key is associated with a private key. The public key may be known by anyone and is used to: 1. Verify a digital signature that is signed by the corresponding private key, 2. Encrypt data that can be decrypted by the corresponding private key, or 3. Compute a piece of shared data.
Source(s):
NIST SP 800-57 Part 2 under Public key [Superseded]

  A cryptographic key used with a public-key cryptographic algorithm that is uniquely associated with an entity and that may be made public. The public key has a corresponding private key. The public key may be known by anyone and, depending on the algorithm, may be used: 1. To verify a digital signature that is signed by the corresponding private key, 2. To encrypt keys that can be decrypted using corresponsing private key, or 3. As on of the input values to compute a shared secret during a key agreement transaction.
Source(s):
NIST SP 800-57 Part 2 Rev.1 under Public key

  A cryptographic key, used with a public-key cryptographic algorithm, that is uniquely associated with an entity and that may be made public. In an asymmetric (public) cryptosystem, the public key has a corresponding private key. The public key may be known by anyone and, depending on the algorithm, may be used, for example, to: 1. Verify a digital signature that is signed by the corresponding private key, 2. Encrypt keys that can be decrypted using the corresponding private key, or 3. Compute a shared secret during a key-agreement transaction.
Source(s):
NIST SP 800-57 Part 1 Rev. 4 under Public key [Superseded]

  A cryptographic key used with a public-key (asymmetric-key) algorithm that is uniquely associated with an entity and that may be made public. In an asymmetric (public) key cryptosystem, the public key is associated with a private key. The public key may be known by anyone and, depending on the algorithm, may be used to 1. Verify a digital signature that is signed by the corresponding private key, 2. Encrypt data that can be decrypted by the corresponding private key, or 3. Compute a shared secret during a key-agreement process.
Source(s):
NIST SP 800-175B Rev. 1 under Public key

  A cryptographic key used with a public-key cryptographic algorithm that is uniquely associated with an entity and that may be made public. In an asymmetric-key (public-key) cryptosystem, the public key has a corresponding private key. The public key may be known by anyone and, depending on the algorithm, may be used, for example, to: 1. Verify a digital signature that was generated using the corresponding private key, 2. Encrypt keys that can be decrypted using the corresponding private key, or 3. Compute a shared secret during a key-agreement transaction.
Source(s):
NIST SP 800-57 Part 1 Rev. 5 under Public key

  A cryptographic key, used with a public-key cryptographic algorithm, that is uniquely associated with an entity and that may be made public. In an asymmetric (public) cryptosystem, the public key is associated with a private key. The public key may be known by anyone and, depending on the algorithm, may be used, for example, to: 1. Verify a digital signature that is signed by the corresponding private key, 2. Encrypt keys that can be decrypted using the corresponding private key, or 3. Compute a shared secret during a key-agreement transaction.
Source(s):
NIST SP 800-57 Part 1 Rev. 3 under Public key [Superseded]