What Is a Public Key?

Written by Coursera Staff • Updated on

Learn what a public key is, how it relates to public key encryption, and when you might need to use one.

[Featued image] A cybersecurity analyst is working from home and is learning about public keys.

A public key is a type of cryptographic code that’s used to encrypt and decrypt sensitive information. “Keys” in cryptography are pieces of information that scramble data so it is uninterpretable without an algorithm specifically designed to unlock the information. A public key, along with its counterpart, a private key, forms the cornerstone of public key cryptography. 

Placeholder

course

Generative AI for Everyone

Instructed by AI pioneer Andrew Ng, Generative AI for Everyone offers his unique perspective on empowering you and your work with generative AI. Andrew will ...

4.8

(3,318 ratings)

540,675 already enrolled

Beginner level

Average time: 5 hour(s)

Learn at your own pace

Skills you'll build:

Machine Learning, Generative AI, ChatGPT, Reinforcement Learning, Business Process Automation, Data Ethics, Automation, Feasibility Studies, Cloud Applications, Ethical Standards And Conduct, Artificial Intelligence, OpenAI, Artificial Intelligence and Machine Learning (AI/ML)

Why are public and private keys important?

Public keys are important because they help protect sensitive information and send it securely. 

For example, imagine sending a confidential letter that’s only intended for the recipient, you might consider sending the letter in a locked box, but you would also have to send the key. However, if someone intercepts your package they’ll have access to the key and easily unlock the box and read your letter. This is the challenge that public key encryption aims to solve.

With public key encryption, instead of one key, you have two. So, when sending your letter in a locked box, your public key would protect (or encrypt) the box, and only the private key of the recipient can unlock (or decrypt) it. This way, even if someone intercepts your package, they can't open the box without the recipient's private key. The public key ensures your message remains secure during its journey.

What is public key encryption?

Public key encryption, also known as asymmetrical encryption and public key cryptography, is a type of encryption that secures data transfer over the internet. The term “public” means it's openly distributed and accessible to everyone, while the “private” key is known only to the owner

Public key vs. private key

A public key is an encryption tool that gets shared widely, and a private key is for decryption and is kept secret.

Placeholder

How are public keys used?

Public keys are commonly used in secure digital information transfers, such as with cryptocurrencies and digital signatures. For a cryptocurrency wallet, the public key acts as an address that people can send you cryptocurrency with. It's similar to an email address, but for cryptocurrency. On the other hand, your private key allows you to access and manage your crypto. With it, you can prove the cryptocurrency belongs to you.

Public keys are also used in the creation of digital signatures. Just as you sign a paper document to verify it came from you, a digital signature does the same for electronic documents. Here, the private key creates the signature, and the public key validates it. It guarantees that no one tampered with the message during transit and authenticates the sender's identity.

Start learning about private key infrastructure and cybersecurity on Coursera

If you’re ready to get started in a cybersecurity career, consider enrolling in the Google Cybersecurity Professional Certificate on Coursera. Learn how to use job essential tools like Splunk, Chronicle, playbook, and more. This program is designed ​​to help individuals with no previous experience find their first job in the cybersecurity field, all at their own pace. 

Placeholder

professional certificate

Google Cybersecurity

Get on the fast track to a career in cybersecurity. In this certificate program, you'll learn in-demand skills, and get AI training from Google experts. Learn at your own pace, no degree or experience required.

4.8

(42,217 ratings)

907,810 already enrolled

Beginner level

Average time: 6 month(s)

Learn at your own pace

Skills you'll build:

Network Security, Security Information and Event Management (SIEM) tools, Linux, Cloud Computing, Intrusion Detection Systems (IDS), Python Programming, SQL, Continuous Monitoring, Security Information and Event Management (SIEM), Threat Detection, TCP/IP, Computer Security Incident Management, Packet Analyzer, Network Protocols, Incident Response, Record Keeping, Intrusion Detection and Prevention, Network Monitoring, Incident Management, Event Monitoring, Splunk, Network Analysis, Technical Documentation, Network Infrastructure, Hardening, Cloud Security, General Networking, Computer Networking, Virtual Private Networks (VPN), Cybersecurity, Network Architecture, Cloud Networks, Vulnerability Assessments, Firewall, Transmission Control Protocol / Internet Protocol (TCP/IP), Security Hardening, resume and portfolio preparation, Interviewing Skills, Professional Networking, Data Ethics, Data Security, Job preparedness, stakeholder communication, Business Ethics, Stakeholder Communications, Security Awareness, escalation, Stakeholder Engagement, Asset Protection, integrity and discretion, Communication, Ethical Standards And Conduct, Cyber Attacks, Personally Identifiable Information, Security Strategy, Information Systems Security Assessment Framework (ISSAF), Security Controls, Information Assurance, NIST Cybersecurity Framework (CSF), Information Security (INFOSEC), Cyber Risk, Historical Attacks, Ethics in cybersecurity, Scripting, Algorithms, PEP 8 style guide, Coding, Automation, Computer Programming, Programming Principles, Debugging, File Management, Data Import/Export, Security Management, Risk Management, Threat Management, Enterprise Security, Auditing, NIST Risk Management Framework (RMF), Open Web Application Security Project (OWASP), Risk Mitigation, Risk Analysis, Information Systems Security, Computer Security, Threat Modeling, Incident Response Playbooks, Security Audits, Malware Protection, threat analysis, Cyber Threat Intelligence, Cryptography, Vulnerability Management, NIST 800-53, vulnerability assessment, Authentications, asset classification, Encryption, MITRE ATT&CK Framework, Authorization (Computing), Risk Management Framework, Authentication, Command-Line Interface, File Systems, Operating Systems, Query Languages, Relational Databases, Linux Commands, Database Management, User Accounts, Command line interface (CLI), Unix Shell, Bash

Updated on
Written by:

Editorial Team

Coursera’s editorial team is comprised of highly experienced professional editors, writers, and fact...

This content has been made available for informational purposes only. Learners are advised to conduct additional research to ensure that courses and other credentials pursued meet their personal, professional, and financial goals.

Advance in your career with recognized credentials across levels.

Subscribe to earn unlimited certificates and build job-ready skills from top organizations.