To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

File:Public key encryption.svg

From Wikipedia, the free encyclopedia

Original file(SVG file, nominally 525 × 513 pixels, file size: 20 KB)

Summary

Description

Public-key cryptography / asymmetric cryptography, encryption. Anyone can encrypt using the public key, but only the holder of the private key can decrypt. Security depends on the secrecy of the private key.

Original illustration by David Göthberg, Sweden.

Released by David as public domain.
Date
Source Own work
Author Davidgothberg
Other versions

This image is part in a series of images showing the four basic public-key cryptography operations: Creating a key pair, encrypting, signing, and creating a shared secret. Note that no single cryptosystem can do all three operations: For instance RSA can do encryption and signing, while Diffie–Hellman can create shared secrets.

See Category:Cryptography diagrams for several related diagrams.
SVG development
InfoField
 
The SVG code is valid.
 
This diagram was created with Inkscape…important.
 
 This diagram uses embedded text that can be easily translated using a text editor.

Licensing

Public domain I, the copyright holder of this work, release this work into the public domain. This applies worldwide.
In some countries this may not be legally possible; if so:
I grant anyone the right to use this work for any purpose, without any conditions, unless such conditions are required by law.

Captions

Add a one-line explanation of what this file represents

Items portrayed in this file

depicts

7 August 2006

image/svg+xml

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current11:29, 2 August 2018Thumbnail for version as of 11:29, 2 August 2018525 × 513 (20 KB)FlippyFlinkAligned name Bob and Alice with (portable) Inkscape editor.
08:36, 7 July 2017Thumbnail for version as of 08:36, 7 July 2017525 × 513 (20 KB)WinstonleeReverted to version as of 21:11, 21 August 2006 (UTC)
06:04, 6 July 2017Thumbnail for version as of 06:04, 6 July 2017525 × 513 (20 KB)WinstonleeTypically Alice wants to send message to Bob using Bob's public key, instead of the reverse.
21:11, 21 August 2006Thumbnail for version as of 21:11, 21 August 2006525 × 513 (20 KB)DavidgothbergImproved image.
19:02, 21 August 2006Thumbnail for version as of 19:02, 21 August 2006544 × 513 (20 KB)DavidgothbergImproved image.
07:42, 7 August 2006Thumbnail for version as of 07:42, 7 August 2006530 × 400 (15 KB)DavidgothbergPublic-key cryptography / asymmetric cryptography, encryption. A message that is encrypted with the public key can only be decrypted with the secret key. The public key can NOT decrypt the message. This means any one can send encrypted messages to the ow
The following pages on the English Wikipedia use this file (pages on other projects are not listed):

Global file usage

The following other wikis use this file:

Metadata

Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.