Definitions
Sorry, no definitions found. Check out and contribute to the discussion of this word!
Etymologies
Sorry, no etymologies found.
Examples

In 1976, three menWhitfield Diffie, Martin Hellman, and Ralph Merkledeveloped a technology that's now vital to the Internet and ecommerce, namely publickey cryptography.

IANAE, but my understanding is that a lot of cryptographic protocols use a publickey system to exchange sessionspecific private keys, which are then used for all further communication …

Thanks to that crazy man Loebner, no publickey encryption system is safe anymore.

The IDF and the Pentagon use publickey systems to secure their classified data networks.

But you can solve the problem by using publickey cryptography, which is the kind of encryption you see on the Internet.

FWIW, I think when you say “most modern cryptographic systems in wide use are based on a certain mathematical asymmetry,” you actually mean most publickey cryptographic systems are based on oneway functions — and one in particular (RSA) is based on building oneway functions out of the presumed hardness of factoring large numbers.

It's even got a nice long publickey signature to prove it's legit.

“But if the publickey system is so safe, how did Olam decode that message?”

It's even got a nice long publickey signature to prove it's legit.

A quantum computer could break publickey codes, which are now considered unbreakable.
Comments
Log in or sign up to get involved in the conversation. It's quick and easy.