aboutsummaryrefslogtreecommitdiffstats
path: root/docs
diff options
context:
space:
mode:
authorDavid Reid <dreid@dreid.org>2014-02-17 13:58:22 -0800
committerDavid Reid <dreid@dreid.org>2014-02-17 13:58:22 -0800
commit4c0bc035691665710a4da6eb400d4e22fffee4e8 (patch)
treeb8ba8294cdda1d839311fde2850af3422635e846 /docs
parent873a6dae7cd93aa581ae9068837d285ce7834c26 (diff)
parent2c89df54d0d1902e10b2348a1e0520a95ab6760b (diff)
downloadcryptography-4c0bc035691665710a4da6eb400d4e22fffee4e8.tar.gz
cryptography-4c0bc035691665710a4da6eb400d4e22fffee4e8.tar.bz2
cryptography-4c0bc035691665710a4da6eb400d4e22fffee4e8.zip
Merge pull request #632 from alex/glossary-public-key
Document public key and private keys in teh glossary
Diffstat (limited to 'docs')
-rw-r--r--docs/glossary.rst22
1 files changed, 21 insertions, 1 deletions
diff --git a/docs/glossary.rst b/docs/glossary.rst
index 4421fca3..ef422a6e 100644
--- a/docs/glossary.rst
+++ b/docs/glossary.rst
@@ -26,9 +26,29 @@ Glossary
Cryptographic operations where encryption and decryption use the same
key.
+ public-key cryptography
asymmetric cryptography
Cryptographic operations where encryption and decryption use different
- keys. There are separate encryption and decryption keys.
+ keys. There are separate encryption and decryption keys. Typically
+ encryption is performed using a :term:`public key`, and it can then be
+ decrypted using a :term:`private key`. Asymmetric cryptography can also
+ be used to create signatures, which can be generated with a
+ :term:`private key` and verified with a :term:`public key`.
+
+ public key
+ This is one of two keys involved in :term:`public-key cryptography`. It
+ can be used to encrypt messages for someone possessing the
+ corresponding :term:`private key` and to verify signatures created with
+ the corresponding :term:`private key`. This can be distributed
+ publicly, hence the name.
+
+ private key
+ This is one of two keys involved in :term:`public-key cryptography`. It
+ can be used to decrypt messages which were encrypted with the
+ corresponding :term:`public key`, as well as to create signatures,
+ which can be verified with the corresponding :term:`public key`. These
+ **must** be kept secret, if they are exposed, all encrypted messages
+ are compromised, and an attacker will be able to forge signatures.
authentication
The process of verifying that a message was created by a specific