Key signature (cryptography)
- Key signature (cryptography)
In cryptography, a key signature is the result of applying a hash function on a key, for the purpose of simplifying operations on keys.For example, cryptographic keys are often quite large and cumbersome to compare, so a user whowants to verify the presence of a public key in a database might use a smaller key signaturerather than comparing the whole key.
ee also
*Key (cryptography)
Wikimedia Foundation.
2010.
Look at other dictionaries:
Key signature — For use in cryptography, see Key signature (cryptography). Key signature A major / F♯ minor with three sharps placed after the clef. In musical notation, a key signature is a series of sharp or … Wikipedia
Key (cryptography) — In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the… … Wikipedia
Signature (disambiguation) — A signature is a hand written, stylized version of someone s name.Signature may also mean: NOTOC In computers*Signature block, text automatically appended at the bottom of an e mail message, Usenet article, or forum post. *Method signature, in… … Wikipedia
Key — may refer to: Building* Key, Carpentry: timber or metal wedges used across or between two or more members to act as a tightening agent. * Key, Painting: to rough the surface of previous coats of paint to allow a secure bond for the next or top… … Wikipedia
Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption … Wikipedia
Key-agreement protocol — In cryptography, a key agreement protocol is a protocol whereby two or more parties can agree on a key in such a way that both influence the outcome. If properly done, this precludes undesired third parties from forcing a key choice on the… … Wikipedia
Key authentication — is a problem that arises when using public key cryptography. It is the process of assuring that the public key of person A held by person B does in fact belong to person A .In traditional symmetric key cryptography, this problem wasn t an issue… … Wikipedia
Cryptography standards — There are a number of standards related to cryptography. Standard algorithms and protocols provide a focus for study; standards for popular applications attract a large amount of cryptanalysis. Contents 1 Encryption standards 2 Hash standards 3… … Wikipedia
Key (lock) — A cut key A key is an instrument that is used to operate a lock. A typical key consists of two parts: the blade, which slides into the keyway of the lock and distinguishes between different keys, and the bow, which is left protruding so that… … Wikipedia
Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key … Wikipedia