Join the thousands of Tor supporters building an internet powered by privacy. Make a donation today.
Through December 31, your gift will be matched 1:1, up to $300,000!
Chat with us live!
A public-key cryptography system uses pairs of mathematical keys. The public key can be disseminated widely while its corresponding private key is known only by the owner of the key pair. Any person can encrypt a message using the public key of the receiver but only the receiver in possession of the private key is able to decrypt the message. Additionally, the private key can be used to create a signature to prove the identity of the creator of a message or other files. This signature can be verified by the public key.