Diffie, Whitfield, and Susan Landau. Privacy on the line: The politics of wiretapping and encryption. (updated and expanded ed.) MIT press, 2007.
Existing Citations
cryptography (p.13): a transformation of a message that makes the message incomprehensible to anyone who is not in possession of secret information that is needed to restore the message to its normal plaintext or cleartext form. (†2372)
private key (p.397): In public-key cryptography, the key that is known only to the recipient and is used for decryption and signing. (†2377)
public key (p.397): In public-key cryptography, the key that is widely available and is used by the sender to encrypt and by the receiver to verify signatures. (†2376)
public key cryptography (p.644): In a public key cryptosystem enciphering and deciphering are governed by distinct keys, E and D, such that computing D from E is computationally infeasible (e.g., requiring 10100 instructions). The enciphering key E can thus be publicly disclosed without compromising the deciphering key D. Each user of the network can, therefore, place his enciphering key in a public directory. This enables any user of the system to send a message to any other user enciphered in such a way that only the intended receiver is able to decipher it. (†2373)
public key cryptography (p.39): In a public-key cryptosystem, every message is operated on by two keys, one used to encipher the message and other to decipher it…. The keys are inverses in that anything encrypted by one can be decrypted by the other. However, given access to one of these keys, it is computationally infeasible to discover the other one. (†2374)
public key cryptography (p.397): cryptography in which communications are controlled by two keys, one of which can be made public without revealing the other. Public key cryptography makes it possible to separate the capabilities for encrypting and decrypting. (†2375)