# Term:Public Key

## Contents

## FIPS 140-2

Public Key - a cryptographic key used with a public key cryptographic algorithm that is uniquely associated with an entity and that may be made public. (Public keys are not considered CSPs.)

## FIPS 201-1

Public Key - The public part of an asymmetric key pair that is typically used to verify signatures or encrypt data.

## NIST IR 7298

Public Key - A cryptographic key that is used with a public key cryptographic algorithm. The public key is uniquely associated with an entity and may be made public. In an asymmetric (public) cryptosystem, the public key is associated with a private key. The public key may be known by anyone and, depending on the algorithm, may be used to-

- 1) Verify a digital signature that is signed by the corresponding private key,
- 2) Encrypt data that can be decrypted by the corresponding private key, or
- 3) Compute a piece of shared data. SOURCE: SP 800-57

## NIST IR 7298

Public Key - A cryptographic key used with a public key cryptographic algorithm that is uniquely associated with an entity and that may be made public. SOURCE: FIPS 140-2

## NIST IR 7298

Public Key - A cryptographic key used with a public key cryptographic algorithm, uniquely associated with an entity, and which may be made public; it is used to verify a digital signature; this key is mathematically linked with a corresponding private key. SOURCE: FIPS 196

## NIST IR 7298

Public Key - The public part of an asymmetric key pair that is typically used to verify signatures or encrypt data. SOURCE: SP 800-63

## NIST SP 800-116

Public Key - A cryptographic key used with a public key cryptographic algorithm, uniquely associated with an entity, and which may be made public; it is used to verify a digital signature; this key is mathematically linked with a corresponding private key.

## NIST SP 800-32

Public Key - (1) The key of a signature key pair used to validate a digital signature. (2) The key of an encryption key pair that is used to encrypt confidential information. In both cases, this key is made publicly available normally in the form of a digital certificate.

## NIST SP 800-57P1

Public Key - A cryptographic key used with a public key cryptographic algorithm that is uniquely associated with an entity and that may be made public. In an asymmetric (public) cryptosystem, the public key is associated with a private key. The public key may be known by anyone and, depending on the algorithm, may be used to:

- 1. Verify a digital signature that is signed by the corresponding private key,
- 2. Encrypt data that can be decrypted by the corresponding private key, or
- 3. Compute a piece of shared data.

## NIST SP 800-57P2

Public Key - A cryptographic key used with a public key cryptographic algorithm that is uniquely associated with an entity and that may be made public. In an asymmetric (public) cryptosystem, the public key is associated with a private key. The public key may be known by anyone and is used to:

- 1. Verify a digital signature that is signed by the corresponding private key,
- 2. Encrypt data that can be decrypted by the corresponding private key, or
- 3. Compute a piece of shared data.

## NIST SP 800-63v1.0.2

Public Key - The public part of an asymmetric key pair that is typically used to verify signatures or encrypt data.

## NIST SP 800-89

Public Key - A cryptographic key that is used with an asymmetric (public key) cryptographic algorithm and is associated with a private key. The public key is associated with an owner and may be made public. In the case of digital signatures, the public key is used to verify a digital signature that was signed by the corresponding private key.

## NIST SP 800-90

Public Key - In an asymmetric (public) key cryptosystem, that key of an entity's key pair that is publicly known.