Contents [hide]
1 Understanding
2 Description
3 History
4 Security
5 Practical considerations
5.1 Enveloped Public Key Encryption
5.1.1 Public Key Encryption
5.1.2 Digital Signatures
5.2 Certification authority
5.3 A postal analogy
5.4 Actual algorithms: two linked keys
5.5 Weaknesses
5.6 Computational cost
5.7 Associating public keys with identities
5.8 Relation to real world events
5.8.1 Privilege of key revocation
5.8.2 Distribution of a new key
5.8.3 Spreading the revocation
5.8.4 Recovery from a leaked key
6 Examples
7 See also
8 Notes
9 References
10 External links