Asymmetric Keys

February 8, 2018

How Can We Help?

You are here:
< Back

Two related keys, a public key and a private key that are used to perform complementary operations, such as encryption and decryption or signature generation and signature verification.
SOURCE: FIPS 201