- public key authentication
- аутентификация с использованием открытого ключа
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia
Key authentication — is a problem that arises when using public key cryptography. It is the process of assuring that the public key of person A held by person B does in fact belong to person A .In traditional symmetric key cryptography, this problem wasn t an issue… … Wikipedia
Public key infrastructure — In cryptography, a public key infrastructure (PKI) is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). The user identity must be unique for each CA. The binding is established through … Wikipedia
Public key fingerprint — In public key cryptography, a public key fingerprint is a short sequence of bytes used to authenticate or look up a longer public key. Fingerprints are created by applying a cryptographic hash function to a public key. Since fingerprints are… … Wikipedia
Public key certificate — Diagram of an example usage of digital certificate In cryptography, a public key certificate (also known as a digital certificate or identity certificate) is an electronic document which uses a digital signature to bind a public key with an… … Wikipedia
public key infrastructure — An enterprise wide service (i.e. data integrity, user identification and authentication, user non repudiation, data confidentiality, encryption, and digital signature) that supports digital signatures and other public key based security… … Military dictionary
public key cryptography — noun a method of encryption of electronic data sent from one person to another which relies on two authentication keys, one public and one private, the two keys being connected by an algorithm which makes the combination unique, neither key being …
Wireless Public Key Infrastructure — (WPKI) is a two factor authentication scheme using mainly the mobile phone and a laptop. Mainly promoted by banks, mobile operators, and mobile network manufacturers. External links * http://www.wpki.net *… … Wikipedia
Authentication — (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic , that is, that claims made by or about the thing are true. This might involve confirming the identity… … Wikipedia
Key exchange — is any method in cryptography by which cryptographic keys are exchanged between users, allowing use of a cryptographic algorithm. If Alice and Bob wish to exchange encrypted messages, each must be equipped to decrypt received messages and to… … Wikipedia
Authentication server — Authentication servers are servers that provide authentication services to users or other systems. Users and other servers authenticate to such a server, and receive cryptographic tickets. These tickets are then exchanged with one another to… … Wikipedia