Sorry, no definitions found. Check out and contribute to the discussion of this word!


Sorry, no etymologies found.


  • In 1976, three men--Whitfield Diffie, Martin Hellman, and Ralph Merkle--developed a technology that's now vital to the Internet and e-commerce, namely public-key cryptography.


  • It's even got a nice long public-key signature to prove it's legit.


  • FWIW, I think when you say “most modern cryptographic systems in wide use are based on a certain mathematical asymmetry,” you actually mean most public-key cryptographic systems are based on one-way functions — and one in particular (RSA) is based on building one-way functions out of the presumed hardness of factoring large numbers.

    Climate Change and Argumentative Fallacies

  • IANAE, but my understanding is that a lot of cryptographic protocols use a public-key system to exchange session-specific private keys, which are then used for all further communication …

    Climate Change and Argumentative Fallacies

  • “But if the public-key system is so safe, how did Olam decode that message?”

    The Omega Theory

  • A quantum computer could break public-key codes, which are now considered unbreakable.

    The Omega Theory

  • But you can solve the problem by using public-key cryptography, which is the kind of encryption you see on the Internet.

    The Omega Theory

  • Thanks to that crazy man Loebner, no public-key encryption system is safe anymore.

    The Omega Theory

  • The IDF and the Pentagon use public-key systems to secure their classified data networks.

    The Omega Theory

  • In contrast, cases involving new technologies such as wireless networks, public-key encryption, and data-mining technologies raise more complicated issues.

    The Volokh Conspiracy » The Fourth Amendment, New Technologies, and the Case for Caution


Log in or sign up to get involved in the conversation. It's quick and easy.