Public Key Authentication
From Computing and Software Wiki
(Difference between revisions)
| Line 3: | Line 3: | ||
==Background== | ==Background== | ||
| - | == | + | ===Process=== |
| + | * Generate a key pair on your computer | ||
| + | * Copy and/or send your public key to the server or desired recipient of the messages | ||
| + | * When authentication is required, a signature is generated using the private key | ||
| + | * Server uses the public key to verify the signature and grant access | ||
| + | ==Benefits== | ||
| + | |||
| + | ==Drawbacks== | ||
| + | |||
| + | ==Public Key Algorithms== | ||
| + | |||
| + | ==References== | ||
| + | *[http://the.earth.li/~sgtatham/putty/0.55/htmldoc/Chapter8.html#S8.2.8] - Using Public Key Authentication | ||
| + | *[http://www.infosecwriters.com/text_resources/pdf/Public_Key_Cryptography_AMS.pdf] - Public Key Cryptography | ||
==See Also== | ==See Also== | ||
==External Links== | ==External Links== | ||
Revision as of 01:20, 5 April 2009
Public key authentication is a process of information cryptography that involves the use of public and private keys.
Contents |
Background
Process
- Generate a key pair on your computer
- Copy and/or send your public key to the server or desired recipient of the messages
- When authentication is required, a signature is generated using the private key
- Server uses the public key to verify the signature and grant access
