answersLogoWhite

0


Best Answer

Examples of a private organisation: McDonalds, Topshop, The Trafford Centre.

It is an organisation that is owned privatly by someone and who has to sell a product or provide a service to make their money.

Examples of a public organisation: The police, The Fire service.

It is an organisation owned by the government to help the public, it is not owned privately.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

13y ago

"Public Key" and "Private Key" generally refer to the two related keys used in asymmetric encryption. They are usually interchangeable in that the algorithms that use asymmetric encryption require a pair of keys and either key could serve as the public key - likewise, either could serve as the private key. Once one of the keys in the pair is designated as the public key though, the other is then the private key and their designations are permanent - once you choose a key to be the private key, it STAYS the private key. Until the choice is made as to which key in the pair will serve which function, there is NO difference between the public and private key. Once the decision is made, the public key is published for all to use while the owner of the private key is supposed to keep that key PRIVATE (secret).

This answer is:
User Avatar

User Avatar

Wiki User

14y ago

A public key is one that you give out to anyone that wants to send you a message that only you can read.

A private key is never disclosed (that is why is called private) and can only be used by the original owner of key pair. This is used in non-repudiation - to show that a message could only have originated from you, and no one else.

This answer is:
User Avatar

User Avatar

Wiki User

12y ago

You must have both. Your private key, which is held only by you, decrypts data encrypted with your public key which you must share as much as possible.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Difference between public and private key?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is the differences between public wants and private wants in business?

The main difference between public wants and private wants in business is the key words private and public. Private is personal clientele and their personal needs such as jets, hotels, and restaurants. Public wants are governments costs, marketing, and such.


What are the examples of public and private key?

example for the private and public key


What is a characteristic of public key cryptography?

If data is encrypted with the public key, only the private key can decrypt itAnswer Explanation: Public key encryption uses an asymmetric algorithm, which uses a public key and private key combination for the encryption and decryption process. If data is encrypted with the public key, only the private key can decrypt the data. The public key cannot decrypt a message that was encrypted with the public key. Alternatively, if data is encrypted with the private key, only the public key can decrypt the data.


What are the roles of Public and Private Key?

A user's private key is kept private and known only to the user. The user's public key is made available to others to use. The private key can be used to encrypt a signature that can be verified by anyone with the public key. Or the public key can be used to encrypt information that can only be decrypted by the possessor of the private key


Utilizing Public Key Encryption How would John and Jim send an encrypted message between parties?

John would use Jim's public key to encrypt and Jim would use his private key to decrypt.Public Key Cryptography (Asymmetric encryption)An algorithm where data encrypted with a public key can only be decrypted by the matching private key. Vice versa is true, what is encrypted with a private key can only be decrypted with a public key.


Private key encryption safer than public key?

No, Public key cryptography is safer than Private key Cryptography. In public key cryptography only only one part of key is visible to others.


What is the difference between Private key cryptography and public key cryptography?

Public key encryption refers to a type of cypher or code architecture known as public key cryptography that utilizes two keys, or a key pair), to encrypt and decrypt data. One of the two keys is a public key, which anyone can use to encrypt a message for the owner of that key. The encrypted message is sent and the recipient uses his or her private key to decrypt it. This is the basis of public and private key encryption.


With what do we associate the term public key and private key?

The public key is associated with a key that is used in an entire program while a private key is only used within a function.


To accurately transmit an electronic message the sender needs to know one code and the receiver needs to know a different one. what online security measure is being used?

It is the Public Key Encryption. A user using the Public Key Encryption has to have both a private key and a public key to send a secured message. The private key is used to unlock both a private and a public key encryption. A public key cannot unlock a private encryption.


In asymmetric encryption Both the sender and receiver have a private key and a shared private key?

No, both sender and receiver have a private key and a public key. It works like this: if you encrypt something with one key, you need the other to decrypt it. You give everyone a copy of your public key. When they want to send you something encrypted, they use your public key to send it. Only your private key can decrypt it, so no one else can read it. You don't give out your private key.


What are characteristics of public key cryptography?

If data is encrypted with public key, only private key can decrypt it. AGN


How many keys are utilized in asymmetric encryption?

Asymmetric encryption uses at least 2 keys - hence the asymmetry. The keys for encryption and decryption are not the same, so they are not "symmetric". Usually only 2 keys are used - a public key and a private key. The public key is published to a key registry or sent separately to those the key-pair owner wants to communicate with. The private key is retained by the owner. Messages encrypted with the private key can only be decrypted using the public key. If the source of the public key is trusted, this provides some proof of the source of the message. Messages encrypted with the public key can only be decrypted using the private key - so only the owner of the private key should be able to decrypt messages encrypted with their own private key.