• In cryptography, a keyring stores known encryption keys (and, in some cases, passwords). For example, GNU Privacy Guard makes use of keyrings. Java KeyStore...
    342 bytes (30 words) - 22:55, 25 October 2022
  • Thumbnail for GNOME Keyring
    sensitive data is encrypted and stored in a keyring file in the user's home directory. The default keyring uses the login password for encryption, so users...
    4 KB (328 words) - 13:11, 12 June 2024
  • Thumbnail for Keychain
    Keychain (redirect from Keyring)
    (/ˈkitʃeɪn/ ) (also keyring) is a small ring or chain of metal to which several keys, or fobs can be attached. The terms keyring and keychain are often...
    14 KB (1,817 words) - 08:06, 27 May 2025
  • Java KeyStore (category Public-key cryptography)
    CERTivity, Portecle and KeyStore Explorer. Java Secure Socket Extension Keyring (cryptography) Public key infrastructure The keytool Command - a key and certificate...
    2 KB (163 words) - 21:30, 19 February 2024
  • a key server is a computer that receives and then serves existing cryptographic keys to users or other programs. The users' programs can be running...
    12 KB (1,617 words) - 05:18, 12 March 2025
  • Zimmermann–Sassaman key-signing protocol (category Cryptography stubs)
    In cryptography, the Zimmermann–Sassaman key-signing protocol is a protocol to speed up the public key fingerprint verification part of a key signing party...
    4 KB (435 words) - 03:45, 19 August 2024
  • Thumbnail for Key signing party
    Key signing party (category Cryptography stubs)
    In public-key cryptography, a key signing party is an event at which people present their public keys to others in person, who, if they are confident the...
    3 KB (354 words) - 20:38, 23 May 2025
  • and encryption. Cryptographic keys are grouped into cryptographic key types according to the functions they perform. Consider a keyring that contains a...
    10 KB (1,385 words) - 15:15, 16 June 2025
  • Thumbnail for One-time password
    one-time password requires access to something a person has (such as a small keyring fob device with the OTP calculator built into it, or a smartcard or specific...
    26 KB (3,542 words) - 03:44, 7 June 2025
  • Thumbnail for Seahorse (software)
    open-source software portal List of password managers Password manager Cryptography GNOME Keyring "Release stable version 47.0.1". "org.gnome.seahorse.Application...
    4 KB (226 words) - 12:32, 16 May 2025
  • Pretty Good Privacy (category History of cryptography)
    Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing...
    57 KB (6,317 words) - 22:34, 4 June 2025
  • Thumbnail for YubiKey
    YubiKey (category Cryptographic hardware)
    and online services that supports one-time passwords (OTP), public-key cryptography, authentication, and the Universal 2nd Factor (U2F) and FIDO2 protocols...
    32 KB (2,957 words) - 02:48, 21 March 2025
  • Ssh-agent (category Cryptographic software)
    allowing secure remote login to a computer on a network using public-key cryptography. SSH client programs (such as ssh from OpenSSH) typically run for the...
    6 KB (694 words) - 19:56, 5 June 2025
  • Thumbnail for Web of trust
    In cryptography, a web of trust is a concept used in PGP, GnuPG, and other OpenPGP-compatible systems to establish the authenticity of the binding between...
    24 KB (3,527 words) - 01:54, 19 June 2025
  • Mod openpgp (category Cryptography stubs)
    incoming requests' HTTP OpenPGP signatures are valid and known by the local keyring. The module also allowed for the signing and encryption of HTTP requests...
    3 KB (273 words) - 05:14, 29 September 2023
  • "From:" Address Address modifiers (subaddressing) Server hosted public keyring (for encryption) Shared key encryption Zero-knowledge architecture AOL...
    72 KB (3,127 words) - 15:32, 19 May 2025
  • Thumbnail for KWallet
    attackers to cause a denial of service (invalid read operation) via a crafted keyring file, related to sign extensions and "memcpy with overlapping ranges."...
    19 KB (2,649 words) - 17:20, 26 May 2025