Algorithm: Example of Public and Private Key

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Algorithm

An algorithm is a set of instructions designed to perform a specific task. In


computer programming, algorithms are often created as functions. These functions
serve as small programs that can be referenced by a larger program.

Public Key and Private Key


Public and private keys form the basis for public key cryptography, also known as
asymmetric cryptography. In public key cryptography, every public key match to only
one private key. Together, they are used to encrypt and decrypt messages. If you
encode a message using a person’s public key, they can only decode it using their
matching private key.
Example of Public and Private Key: Bob wants to send Alice an encrypted email. To
do this, Bob takes Alice’s public key and encrypts his message to her. Then, when Alice
receives the message, she takes the private key that is known only to her in order to
decrypt the message from Bob.

Authentications
Authentication is the process of recognizing a user's identity. The credentials provided
are compared to those on a file in a database of the authorized user's information on a
local operating system or within an authentication server.
Otherwise, in computing, authentication is the process of verifying the identity
of a person or device. A common example is entering a username and password when
you log in to a website.
Entering the correct login information lets the website know
1) who you are and
2) that it is actually you accessing the website.
Intellectual Property Rights
Intellectual property (IP) pertains to any original creation of the human intellect such as
artistic, literary, technical, or scientific creation. Intellectual property rights (IPR) refer to
the legal rights given to the inventor or creator to protect his invention or creation for a
certain period of time.
Intellectual property (IP) is a diverse legal field, describing four separate but interrelated
forms of exclusive rights in information: Copyrights, Patents, Trademarks and Trade
Secrets. IP exists to foster the production of information by allowing authors and
inventors to recover the cost of information production.

Pseudocode
Pseudocode is an artificial and informal language that helps programmers develop
algorithms. Pseudocode is a "text-based" detail (algorithmic) design tool. The rules
of Pseudocode are reasonably straightforward. All statements showing "dependency"
are to be indented. These include while, do, for, if, switch.

You might also like