## What is a Public Key ?

**Public Key – **Encryption system that uses two keys, a public key for encrypting messages and a private key for decrypting messages, to enable users to verify each other’s messages without exchanging secret keys.

A public keys is created in public key encryption cryptography that uses asymmetric-key encryption algorithms. Public keys are used to convert a message into an unreadable format. Decryption is carried out using a different, but matching, private key. Public and private keys are paired to enable secure communication.

### Free Merchant Terminal explains Public Keys

A public keys may be placed in an open access directory for decryption of the digital signature of the sender, the public keys of the message recipient encrypts the sender’s message. Public keys infrastructure (PKI) produces public and private keys.

The open access public keys may also be e-mailed to trusted contacts and users. Pretty Good Privacy (PGP) is a popular form of public key cryptography. Public PGP keys are housed in a public key server directory to allow public keys sharing. PGP server directory keys may be updated but not removed.

**Public-keys cryptography**, or **asymmetric cryptography**, is any cryptographic system that uses pairs of keys: *public keys* which may be disseminated widely, and *private keys* which are known only to the owner. This accomplishes two functions: authentication, where the public keys verifies that a holder of the paired private key sent the message, and encryption, where only the paired private key holder can decrypt the message encrypted with the public keys.

In a public keys encryption system, any person can encrypt a message using the receiver’s public keys. That encrypted message can only be decrypted with the receiver’s private key. To be practical, the generation of a public and private key -pair must be computationally economical. The strength of a public key cryptography system relies on the computational effort (*work factor* in cryptography) required to find the private key from its paired public keys. Effective security only requires keeping the private key private; the public keys can be openly distributed without compromising security.^{[}

Public keys cryptography systems often rely on cryptographic algorithms based on mathematical problems that currently admit no efficient solution, particularly those inherent in certain integer factorization, discrete logarithm, and elliptic curve relationships. Public key algorithms, unlike symmetric key algorithms, do *not* require a secure channel for the initial exchange of one or more secret keys between the parties.^{}

Because of the computational complexity of asymmetric encryption, it is usually used only for small blocks of data, typically the transfer of a symmetric encryption key (e.g. a session key). This symmetric key is then used to encrypt the rest of the potentially long message sequence. The symmetric encryption/decryption is based on simpler algorithms and is much faster.^{}

In a public key signature system, a person can combine a message with a private key to create a short *digital signature* on the message. Anyone with the corresponding public key can combine a message, a putative digital signature on it, and the known public key to verify whether the signature was valid, i.e. made by the owner of the corresponding private key. Changing the message, even replacing a single letter, will cause verification to fail. In a secure signature system, it is computationally infeasible for anyone who does not know the private key to deduce it from the public key or any number of signatures, or to find a valid signature on any message for which a signature has not hitherto been seen. Thus the authenticity of a message can be demonstrated by the signature, provided the owner of the private key keeps the private key secret.^{}

Public key algorithms are fundamental security ingredients in cryptosystems, applications and protocols. They underpin various Internet standards, such as Transport Layer Security (TLS), S/MIME, PGP, and GPG. Some public key algorithms provide key distribution and secrecy (e.g., Diffie–Hellman key exchange), some provide digital signatures (e.g., Digital Signature Algorithm), and some provide both ( RSA).

Public key cryptography finds application in, among others, the information technology security discipline, information security. Information security (IS) is concerned with all aspects of protecting electronic information assets against security threats. Public key cryptography is used as a method of assuring the confidentiality, authenticity and non-repudiability of electronic communications and data storage.