{"id":5425,"date":"2025-12-19T20:10:31","date_gmt":"2025-12-19T20:10:31","guid":{"rendered":"https:\/\/mgcomdev.wpenginepowered.com\/glossary\/public-key-cryptography-2\/"},"modified":"2025-07-14T09:50:07","modified_gmt":"2025-07-14T09:50:07","slug":"public-key-cryptography","status":"publish","type":"glossary","link":"https:\/\/www.mailgun.com\/de\/glossar\/public-key-cryptography\/","title":{"rendered":"Public Key Cryptography (Asymmetrisches Kryptosystem)"},"content":{"rendered":"<h1>Public Key Cryptography (Asymmetrisches Kryptosystem)<\/h1>\n<p>Bei der Public Key Cryptography handelt es sich um ein asymmetrisches Kryptosystem. Bei diesem Verfahren werden mit einem Schl\u00fcsselpaar Daten verschl\u00fcsselt. Der eine Schl\u00fcssel ist \u00f6ffentlich, der andere ist privat und intern gespeichert. Diese Schl\u00fcssel werden zur Authentifizierung der Absenderidentit\u00e4t oder zur Verschl\u00fcsselung von Daten verwendet.<\/p>\n<p>Public Key Cryptography erm\u00f6glicht Standards wie TLS\/SSL und HTTPS, die E-Mail-Nachrichten auf dem Weg in den Posteingang des Empf\u00e4ngers sch\u00fctzen. Es ist ein guter Standard f\u00fcr die Verschl\u00fcsselung der <a href=\"https:\/\/www.mailgun.com\/blog\/it-engineering\/security-guide-basic-infrastructure-security\/\" target=\"_tabs\" rel=\"noopener noreferrer\">privaten Kommunikation zwischen Teams und Kunden<\/a>. Neben der Public Key Cryptography sind <a href=\"https:\/\/www.mailgun.com\/blog\/deliverability\/email-authentication-your-id-card-sending\/\" target=\"_tabs\" rel=\"noopener noreferrer\">E-Mail-Authentifizierungsmethoden<\/a> wie <a href=\"https:\/\/www.mailgun.com\/blog\/deliverability\/understanding-dkim-how-it-works\/\" target=\"_tabs\" rel=\"noopener noreferrer\">DKIM<\/a>, DMARC, SPF und BIMI f\u00fcr die Authentifizierung und Sicherheit von E-Mails wichtig.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Public Key Cryptography (Asymmetrisches Kryptosystem) Bei der Public Key Cryptography handelt es sich um ein asymmetrisches Kryptosystem. Bei diesem Verfahren werden mit einem Schl\u00fcsselpaar Daten verschl\u00fcsselt. Der eine Schl\u00fcssel ist \u00f6ffentlich, der andere ist privat und intern gespeichert. Diese Schl\u00fcssel werden zur Authentifizierung der Absenderidentit\u00e4t oder zur Verschl\u00fcsselung von Daten verwendet. Public Key Cryptography erm\u00f6glicht [&hellip;]<\/p>\n","protected":false},"template":"","meta":{"_acf_changed":false},"class_list":["post-5425","glossary","type-glossary","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Public Key Cryptography (Asymmetrisches Kryptosystem) \u2013 Glossar der E-Mail-Begriffe | Mailgun<\/title>\n<meta name=\"description\" content=\"Public Key Cryptography bezeichnet den Prozess, einen \u00f6ffentlichen und einen privaten Schl\u00fcssel zu nutzen, um Daten zu verschl\u00fcsseln. Lesen Sie im E-Mail-Glossar von Mailgun, warum dies wichtig ist.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mailgun.com\/de\/glossar\/public-key-cryptography\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Public Key Cryptography (Asymmetrisches Kryptosystem) \u2013 Glossar der E-Mail-Begriffe | Mailgun\" \/>\n<meta property=\"og:description\" content=\"Public Key Cryptography bezeichnet den Prozess, einen \u00f6ffentlichen und einen privaten Schl\u00fcssel zu nutzen, um Daten zu verschl\u00fcsseln. Lesen Sie im E-Mail-Glossar von Mailgun, warum dies wichtig ist.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mailgun.com\/de\/glossar\/public-key-cryptography\/\" \/>\n<meta property=\"og:site_name\" content=\"Transactional Email API Service For Developers | Mailgun\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mailgun.com\\\/de\\\/glossar\\\/public-key-cryptography\\\/\",\"url\":\"https:\\\/\\\/www.mailgun.com\\\/de\\\/glossar\\\/public-key-cryptography\\\/\",\"name\":\"Public Key Cryptography (Asymmetrisches Kryptosystem) \u2013 Glossar der E-Mail-Begriffe | Mailgun\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mailgun.com\\\/de\\\/#website\"},\"datePublished\":\"2025-12-19T20:10:31+00:00\",\"description\":\"Public Key Cryptography bezeichnet den Prozess, einen \u00f6ffentlichen und einen privaten Schl\u00fcssel zu nutzen, um Daten zu verschl\u00fcsseln. Lesen Sie im E-Mail-Glossar von Mailgun, warum dies wichtig ist.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mailgun.com\\\/de\\\/glossar\\\/public-key-cryptography\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mailgun.com\\\/de\\\/glossar\\\/public-key-cryptography\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mailgun.com\\\/de\\\/glossar\\\/public-key-cryptography\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mailgun.com\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Glossary\",\"item\":\"https:\\\/\\\/www.mailgun.com\\\/de\\\/glossar\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Public Key Cryptography (Asymmetrisches Kryptosystem)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mailgun.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/www.mailgun.com\\\/de\\\/\",\"name\":\"Transactional Email API Service For Developers | Mailgun\",\"description\":\"Powerful Transactional Email APIs that enable you to send, receive, and track emails, built with developers in mind. Learn more today!\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mailgun.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mailgun.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mailgun.com\\\/de\\\/#organization\",\"name\":\"Transactional Email API Service For Developers | Mailgun\",\"url\":\"https:\\\/\\\/www.mailgun.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.mailgun.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mailgun.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/cropped-android-chrome-512x512-1.png\",\"contentUrl\":\"https:\\\/\\\/www.mailgun.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/cropped-android-chrome-512x512-1.png\",\"width\":512,\"height\":512,\"caption\":\"Transactional Email API Service For Developers | Mailgun\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mailgun.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Public Key Cryptography (Asymmetrisches Kryptosystem) \u2013 Glossar der E-Mail-Begriffe | Mailgun","description":"Public Key Cryptography bezeichnet den Prozess, einen \u00f6ffentlichen und einen privaten Schl\u00fcssel zu nutzen, um Daten zu verschl\u00fcsseln. Lesen Sie im E-Mail-Glossar von Mailgun, warum dies wichtig ist.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mailgun.com\/de\/glossar\/public-key-cryptography\/","og_locale":"de_DE","og_type":"article","og_title":"Public Key Cryptography (Asymmetrisches Kryptosystem) \u2013 Glossar der E-Mail-Begriffe | Mailgun","og_description":"Public Key Cryptography bezeichnet den Prozess, einen \u00f6ffentlichen und einen privaten Schl\u00fcssel zu nutzen, um Daten zu verschl\u00fcsseln. Lesen Sie im E-Mail-Glossar von Mailgun, warum dies wichtig ist.","og_url":"https:\/\/www.mailgun.com\/de\/glossar\/public-key-cryptography\/","og_site_name":"Transactional Email API Service For Developers | Mailgun","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.mailgun.com\/de\/glossar\/public-key-cryptography\/","url":"https:\/\/www.mailgun.com\/de\/glossar\/public-key-cryptography\/","name":"Public Key Cryptography (Asymmetrisches Kryptosystem) \u2013 Glossar der E-Mail-Begriffe | Mailgun","isPartOf":{"@id":"https:\/\/www.mailgun.com\/de\/#website"},"datePublished":"2025-12-19T20:10:31+00:00","description":"Public Key Cryptography bezeichnet den Prozess, einen \u00f6ffentlichen und einen privaten Schl\u00fcssel zu nutzen, um Daten zu verschl\u00fcsseln. Lesen Sie im E-Mail-Glossar von Mailgun, warum dies wichtig ist.","breadcrumb":{"@id":"https:\/\/www.mailgun.com\/de\/glossar\/public-key-cryptography\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mailgun.com\/de\/glossar\/public-key-cryptography\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mailgun.com\/de\/glossar\/public-key-cryptography\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mailgun.com\/de\/"},{"@type":"ListItem","position":2,"name":"Glossary","item":"https:\/\/www.mailgun.com\/de\/glossar\/"},{"@type":"ListItem","position":3,"name":"Public Key Cryptography (Asymmetrisches Kryptosystem)"}]},{"@type":"WebSite","@id":"https:\/\/www.mailgun.com\/de\/#website","url":"https:\/\/www.mailgun.com\/de\/","name":"Transactional Email API Service For Developers | Mailgun","description":"Powerful Transactional Email APIs that enable you to send, receive, and track emails, built with developers in mind. Learn more today!","publisher":{"@id":"https:\/\/www.mailgun.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mailgun.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.mailgun.com\/de\/#organization","name":"Transactional Email API Service For Developers | Mailgun","url":"https:\/\/www.mailgun.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.mailgun.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.mailgun.com\/wp-content\/uploads\/2025\/06\/cropped-android-chrome-512x512-1.png","contentUrl":"https:\/\/www.mailgun.com\/wp-content\/uploads\/2025\/06\/cropped-android-chrome-512x512-1.png","width":512,"height":512,"caption":"Transactional Email API Service For Developers | Mailgun"},"image":{"@id":"https:\/\/www.mailgun.com\/de\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.mailgun.com\/de\/wp-json\/wp\/v2\/glossary\/5425","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mailgun.com\/de\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/www.mailgun.com\/de\/wp-json\/wp\/v2\/types\/glossary"}],"wp:attachment":[{"href":"https:\/\/www.mailgun.com\/de\/wp-json\/wp\/v2\/media?parent=5425"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}