Public key encryption

A widely publicized technique for sending secure transmissions of data is public key encryption. This technique can be used to encrypt data using an algorithm requiring two particular keys &mdash; a public key and a private key. The two keys are affiliated with the recipient to which the information is to be sent. The public key is distributed publicly, while the private key is kept secret by recipient. Data encrypted using a person's public key can only be decrypted using that person's secret, private key.

For instance, a copyright owner could encrypt a work using the public key of the intended recipient. Once the recipient receives the encrypted transmission, he could then use his private key to decrypt that transmission. No secret (private) keys need to be exchanged in this transaction. Without the private key of the intended recipient, the work cannot be read, manipulated or otherwise deciphered by other parties. Of course, if a decrypted copy is made and shared, then others could manipulate the work unless other means are used to protect it.