Public Key Cryptography Requires a Private and Public Key

You will need a pair of electronic keys in order to use public key cryptography. One key required is called the private key. This key is held on the computer of the person, who requested the keys. The private key is used for encryption and decryption of electronic data. The other type of key required is called the public key. This key is held on the computer of the person, who receives the encrypted data. The public key decrypts the data and allows the receiver to open the data.

A Certificate Authority System Is Needed to Use Public Key Cryptography

Generating and creating the private and public keys needed for public key cryptography requires a certificate authority system. This system generates digital certificates which contain each type of key. Every single user in your organization can have their own private key and can have multiple public keys sent to them from other users.