Public Key Authentication

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
Line 3: Line 3:
==Background==
==Background==
-
==References==
+
===Process===
 +
* Generate a key pair on your computer
 +
* Copy and/or send your public key to the server or desired recipient of the messages
 +
* When authentication is required, a signature is generated using the private key
 +
* Server uses the public key to verify the signature and grant access
 +
==Benefits==
 +
 +
==Drawbacks==
 +
 +
==Public Key Algorithms==
 +
 +
==References==
 +
*[http://the.earth.li/~sgtatham/putty/0.55/htmldoc/Chapter8.html#S8.2.8] - Using Public Key Authentication
 +
*[http://www.infosecwriters.com/text_resources/pdf/Public_Key_Cryptography_AMS.pdf] - Public Key Cryptography
==See Also==
==See Also==
==External Links==
==External Links==

Revision as of 01:20, 5 April 2009

Public key authentication is a process of information cryptography that involves the use of public and private keys.

Contents

Background

Process

  • Generate a key pair on your computer
  • Copy and/or send your public key to the server or desired recipient of the messages
  • When authentication is required, a signature is generated using the private key
  • Server uses the public key to verify the signature and grant access

Benefits

Drawbacks

Public Key Algorithms

References

  • [1] - Using Public Key Authentication
  • [2] - Public Key Cryptography

See Also

External Links

Personal tools