File:Public key shared secret.svg

From Wikimedia Commons, the free media repository
Jump to navigation Jump to search

Original file(SVG file, nominally 581 × 650 pixels, file size: 28 KB)

Render this image in .

Captions

Captions

Add a one-line explanation of what this file represents

Summary[edit]

Description

Public-key cryptography / asymmetric cryptography, shared secret agreement. Alice combines her own private key with Bob's public key to create a shared secret. Likewise Bob combines his own private key with Alice's public key and gets the same shared secret. This secret is now only known by Alice and Bob. The shared secret can be used as a symmetric key for encrypted communication between Alice and Bob and for many other purposes such as MACing and to create multiple message keys etc. Diffie–Hellman key exchange is a method of this type.

Original illustration by David Göthberg, Sweden.

Released by David as public domain.
Date
Source Own work
Author Davidgothberg
Other versions

This image is part in a series of images showing the four basic public-key cryptography operations: Creating a key pair, encrypting, signing, and creating a shared secret. Note that no single cryptosystem can do all three operations: For instance RSA can do encryption and signing, while Diffie–Hellman can create shared secrets.

See Category:Cryptography diagrams for several related diagrams.
SVG development
InfoField
 
The source code of this SVG is invalid due to 84 errors.
 
This W3C-invalid diagram was created with Inkscape…important.
 
 This diagram is translated using SVG switch elements: all translations are stored in the same file.

Licensing[edit]

Public domain I, the copyright holder of this work, release this work into the public domain. This applies worldwide.
In some countries this may not be legally possible; if so:
I grant anyone the right to use this work for any purpose, without any conditions, unless such conditions are required by law.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current15:19, 7 July 2017Thumbnail for version as of 15:19, 7 July 2017581 × 650 (28 KB)Winstonlee (talk | contribs)enable chinese language
21:02, 21 August 2006Thumbnail for version as of 21:02, 21 August 2006581 × 650 (24 KB)Davidgothberg (talk | contribs)Improved image.
08:39, 7 August 2006Thumbnail for version as of 08:39, 7 August 2006581 × 650 (21 KB)Davidgothberg (talk | contribs)Public-key cryptography / asymmetric cryptography, shared secret agreement. Alice combines her own secret key with Bob's public key to create a shared secret. Likewise Bob combines his own secret key with Alice's public key and gets the same shared secre

File usage on other wikis

The following other wikis use this file:

Metadata