• SELECT SITE CURRENCY
Select a currency for use throughout the site
Public Key Encryption Applications
Faulkner, January 2003, Pages: 7
Public Key Encryption originated as a means to enhance the secure transmission of documents, which initially relied on single key encryption that allowed both the sender and receiver to use the same "key" to encrypt and decrypt documents. PKI leveraged the encryption technology and added another key, a private one that the recipient used to decrypt the message. This second key or certificate ensures that even those who could access the originating public key could not interpret the transmission. Currently, Public Key Encryption technology is incorporated into many different types of applications such as servers, operating systems, databases and even standalone devices such as smart cards and mobile phones. Each application acts as a key certificate authority that is trusted by everyone to maintain security information.