Public Key Authentication
From Computing and Software Wiki
(Difference between revisions)
Line 3: | Line 3: | ||
==Background== | ==Background== | ||
- | == | + | ===Process=== |
+ | * Generate a key pair on your computer | ||
+ | * Copy and/or send your public key to the server or desired recipient of the messages | ||
+ | * When authentication is required, a signature is generated using the private key | ||
+ | * Server uses the public key to verify the signature and grant access | ||
+ | ==Benefits== | ||
+ | |||
+ | ==Drawbacks== | ||
+ | |||
+ | ==Public Key Algorithms== | ||
+ | |||
+ | ==References== | ||
+ | *[http://the.earth.li/~sgtatham/putty/0.55/htmldoc/Chapter8.html#S8.2.8] - Using Public Key Authentication | ||
+ | *[http://www.infosecwriters.com/text_resources/pdf/Public_Key_Cryptography_AMS.pdf] - Public Key Cryptography | ||
==See Also== | ==See Also== | ||
==External Links== | ==External Links== |
Revision as of 01:20, 5 April 2009
Public key authentication is a process of information cryptography that involves the use of public and private keys.
Contents |
Background
Process
- Generate a key pair on your computer
- Copy and/or send your public key to the server or desired recipient of the messages
- When authentication is required, a signature is generated using the private key
- Server uses the public key to verify the signature and grant access