aboutsummaryrefslogtreecommitdiffstats
path: root/docs/glossary.rst
diff options
context:
space:
mode:
authorAlex Gaynor <alex.gaynor@gmail.com>2014-02-17 13:21:39 -0800
committerAlex Gaynor <alex.gaynor@gmail.com>2014-02-17 13:21:39 -0800
commit049a36844b3a15de6264f422959f9b6ffc092fa3 (patch)
treeaaec1dbf35721fc43f8ab3261ea8664d7b2c425b /docs/glossary.rst
parent873a6dae7cd93aa581ae9068837d285ce7834c26 (diff)
downloadcryptography-049a36844b3a15de6264f422959f9b6ffc092fa3.tar.gz
cryptography-049a36844b3a15de6264f422959f9b6ffc092fa3.tar.bz2
cryptography-049a36844b3a15de6264f422959f9b6ffc092fa3.zip
Document public key and private keys in teh glossary
Diffstat (limited to 'docs/glossary.rst')
-rw-r--r--docs/glossary.rst22
1 files changed, 21 insertions, 1 deletions
diff --git a/docs/glossary.rst b/docs/glossary.rst
index 4421fca3..666e77da 100644
--- a/docs/glossary.rst
+++ b/docs/glossary.rst
@@ -26,9 +26,29 @@ Glossary
Cryptographic operations where encryption and decryption use the same
key.
+ public-key cryptography
asymmetric cryptography
Cryptographic operations where encryption and decryption use different
- keys. There are separate encryption and decryption keys.
+ keys. There are separate encryption and decryption keys. Typically
+ encryption is performed using a :term:`public key`, and it can then be
+ decrypted using a :term:`private key`. Asymmetric cryptography can also
+ be used to create signatures, which can be generated with a
+ :term:`private key` and verified with a :term:`public key`.
+
+ public key
+ This is one of two keys involved in :term:`public-key cryptography`. It
+ can be used to encrypt messages for someone posessing the corrosponding
+ :term:`private key` and to verify signatures created with the
+ corrosponding :term:`private key`. This can be distributed publicly,
+ hence the name.
+
+ private key
+ This is one of two keys involved in :term:`public-key cryptography`. It
+ can be used to decrypt messages which were encrypted with the
+ corrosponding :term:`public key`, as well as to create signatures,
+ which can be verified with the corrosponding :term:`public key`. These
+ **must** be kept secret, if they are exposed, all encrypted messages
+ are compromised, and an attacker will be able to forge signatures.
authentication
The process of verifying that a message was created by a specific