Key (lock)
Encyclopedia
A key is an instrument that is used to operate a lock
Lock (device)
A lock is a mechanical or electronic fastening device that is released by a physical object or secret information , or combination of more than one of these....

. A typical key consists of two parts: the blade, which slides into the keyway
Keyway
A keyway is the shaped channel in a lock cylinder into which the key slides to gain access to the lock tumblers. Lock keyway shapes vary widely with lock manufacturer, and many manufacturers have a number of unique profiles requiring a specifically milled key blank to engage the lock's...

 of the lock and distinguishes between different keys, and the bow, which is left protruding so that torque can be applied by the user. The blade is usually intended to operate one specific lock or a small number of locks that are keyed alike. The key serves as a security token
Security token
A security token may be a physical device that an authorized user of computer services is given to ease authentication...

 for access to the locked area; only persons having the correct key can open the lock and gain access.

Keys provide an inexpensive, though imperfect, method of access control
Access control
Access control refers to exerting control over who can interact with a resource. Often but not always, this involves an authority, who does the controlling. The resource can be a given building, group of buildings, or computer-based information system...

 for access to properties like buildings and vehicles. As such, keys are an essential feature of modern living in the developed world, and are common around the globe. It is common for people to carry the set of keys they need for their daily activities around with them, often linked by a keyring adorned by trinkets usually known as a keychain.

House keys

A house key is the most common sort of key. There are two main forms. The older form is for lever locks, where a pack of flat levers (typically between two and five) are raised to different heights by the key whereupon the slots or gates of the levers line up and permit a bolt to move back and forth, opening or closing the lock. The teeth or bitting
Bitting
A bitting is the part of the key that actually engages the tumblers to activate the lock. Bittings are often represented as a code which instructs how a key is to be cut by a locksmith. The bitting is usually a series of integers that is usually translated from a key code chart or from a...

s of the key have flat tops rather than being pointed. Lever lock keys tend to be bigger and less convenient for carrying, although lever locks tend to be more secure.

The more recent form of house key is that for a pin-tumbler
Pin tumbler lock
The pin tumbler lock is a lock mechanism that uses pins of varying lengths to prevent the lock from opening without the correct key...

 or wafer-tumbler lock. When held upright, as if to open a door, a series of grooves on either side of the key (the key's blade) limits the type of lock
Lock (device)
A lock is a mechanical or electronic fastening device that is released by a physical object or secret information , or combination of more than one of these....

 the key can slide into. As the key slides into the lock, the grooves on the blade of the key align with the ward
Warded lock
A warded lock is a type of lock that uses a set of obstructions, or wards, to prevent the lock from opening unless the correct key is inserted. The correct key has notches or slots corresponding to the obstructions in the lock, allowing it to rotate freely inside the lock...

s in the keyway
Keyway
A keyway is the shaped channel in a lock cylinder into which the key slides to gain access to the lock tumblers. Lock keyway shapes vary widely with lock manufacturer, and many manufacturers have a number of unique profiles requiring a specifically milled key blank to engage the lock's...

 allowing or denying entry to the cylinder
Cylinder (geometry)
A cylinder is one of the most basic curvilinear geometric shapes, the surface formed by the points at a fixed distance from a given line segment, the axis of the cylinder. The solid enclosed by this surface and by two planes perpendicular to the axis is also called a cylinder...

. Then a series of pointed teeth and notches on the blade called bittings
Bitting
A bitting is the part of the key that actually engages the tumblers to activate the lock. Bittings are often represented as a code which instructs how a key is to be cut by a locksmith. The bitting is usually a series of integers that is usually translated from a key code chart or from a...

 allow pins
Pin tumbler lock
The pin tumbler lock is a lock mechanism that uses pins of varying lengths to prevent the lock from opening without the correct key...

 or wafers to move up and down until they align with the shear line of the inner and outer cylinder, allowing the cylinder or cam
Cam
A cam is a rotating or sliding piece in a mechanical linkage used especially in transforming rotary motion into linear motion or vice-versa. It is often a part of a rotating wheel or shaft that strikes a lever at one or more points on its circular path...

 to rotate freely inside the lock, which opens the lock.

Car key

A car key or an automobile key is a key used to open and start an automobile, or both. Modern key designs are usually symmetrical, and some use grooves on both sides, rather than a cut edge, to actuate the lock. It has multiple uses for the automobile
Automobile
An automobile, autocar, motor car or car is a wheeled motor vehicle used for transporting passengers, which also carries its own engine or motor...

 with which it was sold. A car key can open the doors, as well as start the ignition
Ignition system
An ignition system is a system for igniting a fuel-air mixture. Ignition systems are well known in the field of internal combustion engines such as those used in petrol engines used to power the majority of motor vehicles, but they are also used in many other applications such as in oil-fired and...

, open the glove compartment
Glove compartment
A glove compartment or glovebox, also known as a little cupboard, is a compartment built into the dashboard, located over the front-seat passenger's footwell in an automobile, often used for miscellaneous storage. The name derives from the original purpose of the compartment, to store gloves...

 and also open the trunk
Trunk (automobile)
The trunk or boot of an automobile or car is the vehicle's main storage, luggage, or cargo compartment. Trunk is used in North American English and Jamaican English; boot is used elsewhere in the English speaking world. Trunk is also primarily used in many non-English speaking regions, such as...

 (boot) of the car. Some cars come with an additional key known as a valet key that starts the ignition and opens the driver's side door, but prevents the valet
Valet parking
Valet parking is a parking service offered by some restaurants, stores, and other businesses, particularly in North America. In contrast to "self-parking", where customers find a parking space on their own, customers' vehicles are parked for them by a person called a valet...

 from gaining access to valuables that are located in the trunk or the glove box. Some valet keys, particularly those to high-performance vehicles, go so far as to restrict the engine's power output to prevent joyriding
Joyride (crime)
To joyride is to drive around in a stolen car, boat, or other vehicle with no particular goal, a ride taken solely for pleasure.In English law, joyriding is not considered to be theft, because the intention to "permanently deprive" the owner of the vehicle cannot be proven...

. Recently, features such as code
Code
A code is a rule for converting a piece of information into another form or representation , not necessarily of the same type....

d immobilizers have been implemented in newer vehicles. More sophisticated systems make ignition dependent on electronic devices, rather than the mechanical keyswitch.

Ignition switches or locks are combined with security locking of the steering column
Steering wheel
A steering wheel is a type of steering control in vehicles and vessels ....

 (in many modern vehicles) or the gear lever
Gear stick
A gear stick is the lever used to change gear in a vehicle, such as an automobile, with manual transmission or several common forms of automatic transmission.The device is used to change gear; in a manual transmission vehicle this will normally be done whilst depressing...

 (such as in Saab Automobile
Saab Automobile
Saab Automobile AB, better known as Saab , is a Swedish car manufacturer owned by Dutch automobile manufacturer Swedish Automobile NV, formerly Spyker Cars NV. It is the exclusive automobile Royal Warrant holder as appointed by the King of Sweden...

 vehicles). In the latter, the switch is between the seats, preventing damage to the driver's knee in the event of a collision.

Keyless entry systems, which use either a door-mounted keypad or a remote control in place of a car key, are becoming a standard feature on many new cars. Some of them are handsfree
Handsfree
Handsfree is an adjective describing equipment that can be used without the use of hands or, in a wider sense, equipment which needs only limited use of hands, or for which the controls are positioned so that the hands are able to occupy themselves with another task without needing to hunt far...

.

Some high-tech automotive keys are billed as theft deterrents. Mercedes-Benz
Mercedes-Benz
Mercedes-Benz is a German manufacturer of automobiles, buses, coaches, and trucks. Mercedes-Benz is a division of its parent company, Daimler AG...

 uses a key that, rather than have a cut metal piece to start the car, uses an encoded infrared
Infrared
Infrared light is electromagnetic radiation with a wavelength longer than that of visible light, measured from the nominal edge of visible red light at 0.74 micrometres , and extending conventionally to 300 µm...

 beam that communicates with the car's computer. If the codes match, the car can be started. These keys can be expensive to replace if lost and can cost up to US $400.

A switchblade key is basically the same as any other car key, except in appearance. The switchblade key is designed to fold away inside the fob when it is not being used. Switchblade keys have become very popular recently because of their smart compact look. This type of key has also been known to be confiscated by airport security officials.

Because switchblade keys are only developed for new car models, they are usually equipped with a programmed transponder chip.

Master key

A master key operates a set of several locks. Usually, there is nothing special about the key itself, but rather the locks into which it will fit. These locks also have keys that are specific to each one (the change key
Change key
A change key is a key on the lowest level of a master keying system. Change keys are also referred to as day keys. Typically change keys are issued to personnel that require access to one or two areas in a facility...

) and cannot operate any of the others in the set. Locks that have master keys have a second set of the mechanism used to operate them that is identical to all of the others in the set of locks. For example, master keyed pin tumbler lock
Pin tumbler lock
The pin tumbler lock is a lock mechanism that uses pins of varying lengths to prevent the lock from opening without the correct key...

s will have two shear points at each pin position, one for the change key and one for the master key. A far more secure (and more expensive) system has two cylinders in each lock, one for the change key and one for the master key.

Larger organizations, with more complex "grandmaster key" systems, may have several masterkey systems where the top level grandmaster key works in all of the locks in the system.

A practical attack
Vulnerability (computing)
In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance.Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw...

 exists to create a working master key for an entire system given only access to a single master-keyed lock, its associated change key, a supply of appropriate key blanks, and the ability to cut new keys. This is described in Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks. Master keyed locks are also easier to pick, due to the fact the lock has two shear points.

Locksmiths may also determine cuts for a replacement master key, when given several different key examples from a given system.

Control key

A control key is a special key used in removable core locking systems. The control key enables a user with very little skill to remove from the cylinder, quickly and easily, a core with a specific combination and replace it with a core with a different combination. In Small Format Interchangeable Cores (SFIC), similar to those developed by Frank Best of the Best Lock Corporation
Best Lock Corporation
Best Lock Corporation is the former name of a publicly traded door hardware and lock manufacturer. Originally founded in 1925 as Best Universal Lock Company by Frank Ellison Best, the privately held company relocated from Seattle, Washington to Indianapolis, Indiana in 1938, where operations...

, the key operates a separate shear line, located above the operating key shear line. In Large Format Removable Cores (LFRC), the key may operate a separate shear line or the key may work like a master key along the operating shear line and also contact a separate locking pin that holds the core in the cylinder. SFIC's are interchangeable from one brand to another, while LFRC's are not.

Transponder key

Transponder keys may also be called “chip keys”. Transponder
Transponder
In telecommunication, the term transponder has the following meanings:...

 keys are automotive ignition keys with signal-emitting circuits built inside.

When the key is turned in the ignition cylinder, the car's computer transmits a radio signal to the transponder circuit. The circuit has no battery; it is energized by the radio signal itself. The circuit typically has a computer chip that is programmed to respond by sending a coded signal back to the car's computer. If the circuit does not respond or if the code is incorrect, the engine will not start. Many cars immobilize if the wrong key is used by intruders. Chip Keys successfully protect cars from theft in two ways: forcing the ignition cylinder won't start the car, and the keys are difficult to duplicate. This is why chip keys are popular in modern cars and help decrease car theft.

Many people who have transponder keys are not aware of the fact because the circuit is hidden inside the plastic head of the key. On the other hand, General Motors produced what are known as VATS keys (Vehicle Anti-Theft System) during the 1990s, which are often erroneously believed to be transponders but actually use a simple resistor, which is visible in the blade of the key. If the value of the resistor is wrong, or the key is a normal key without a resistor, the circuit of the car's electrical system will not allow the engine to be started.

Double-sided key

A double-sided key is very similar to a house or car key with the exception that it has two sets of teeth, an upper level standard set of teeth and a lower, less defined set of teeth beside it. This makes the double-sided key's profile and its corresponding lock look very similar to a standard key while making the attempt to pick the lock more difficult.

Four-sided key

A four-sided key (also known a cross or cruciform key) has four sides, making it not only harder to duplicate and the lock harder to pick but also more physically durable.

Paracentric key

A paracentric key is designed to open a paracentric lock. It is distinguishable by the contorted shape of its blade, which protrudes past the centre vertical line of the key barrel. Instead of the wards on the outer face of the lock simply protruding into the shape of the key along the spine, the wards protrude into the shape of the key along the entire width of the key, including along the length of the teeth.

Internal cut key

An internal cut (also known as "Sidewinder" or "Laser Cut") key has a rectangular blade with a wavy groove cut up the center of the face of blade, at constant depth.

Typically the key has an identical wavy groove on the back of the blade, making it symmetrical so it works no matter which way it is inserted. Also referred to as the inner profile or sidewinder. These keys must be cut by special key cutting machines made for them.

Abloy key

Abloy keys are cut from a metal half-cylinder. The cuts are made at different angles, so when the key is turned in the lock it rotates each disk a different amount.

Nearly all the houses in Finland use Abloy keys, although they are also widely used in various locales worldwide. These locks are considered very secure and almost impossible to pick.

Dimple key

A dimple key has a rectangular blade with various cone-shaped dimples drilled into the face of the blade at various depths. Typically the lock has 2 rows of pins that match up with 2 rows of dimples. Typically the key has the same dimple pattern on the back of the blade, making it symmetrical so it works no matter which way it is inserted.

Kaba and Dom are manufactures of dimpled keys. These keys are relatively easy to not only pick, but also make impressions of.

Skeleton key

A skeleton key (or passkey) is a very simple design of key that usually has a cylindrical shaft (sometimes called a "shank") and a single, minimal flat, rectangular tooth or "bit". Skeleton keys are also usually distinguished by their "bow", or the part one would grasp when inserting the key, which can be either very plain or extremely ornate. A skeleton key is designed to circumvent the wards in warded lock
Warded lock
A warded lock is a type of lock that uses a set of obstructions, or wards, to prevent the lock from opening unless the correct key is inserted. The correct key has notches or slots corresponding to the obstructions in the lock, allowing it to rotate freely inside the lock...

s. Warded locks and their keys provide minimal security and only a slight deterrent as any key with a shaft and tooth that has the same or smaller dimensions will open the lock. However, warded keys were designed to only fit a matching lock and the skeleton key would often fit many. Many other objects that can fit into the lock may also be able to open it.

Due to its limited usefulness, this type of lock fell out of use after more complicated types became easier to manufacture. In modern usage, the term "skeleton key" is often misapplied to ordinary bit keys and barrel keys, rather than the correct definition: a key, usually with minimal features, which can open all or most of a type of badly designed lock. Bit keys and barrel keys can be newly minted (and sold by restoration hardware companies) or found in antique stores.

They were most popular in the late 1800s, although they continued to be used well into the 20th century and can still be found today in use, albeit in vintage homes and antique furniture.

A bit key is distinguished from a barrel key in that a bit key usually has a solid shank, whereas a barrel shafted key can be made either by drilling out the shank from the bit end or by folding metal into a barrel shape when forging the key.

Tubular key

A tubular key (sometimes referred to as a barrel key when describing a vintage or antique model) is one that is designed to open a tubular pin tumbler lock
Tubular pin tumbler lock
A tubular pin tumbler lock, also known as Ace lock; axial pin tumbler lock; or radial lock, is a variety of pin tumbler lock in which 6-8 pins are arranged in a circular pattern, and the corresponding key is tubular or cylindrical in shape....

. It has a hollow, cylindrical shaft that is usually much shorter and has a larger diameter than most conventional keys. Antique or vintage-style barrel keys often closely resemble the more traditional skeleton key but are a more recent innovation in keymaking. In modern keys of this type, a number of grooves of varying length are built into the outer surface at the end of the shaft. These grooves are parallel to the shaft and allow the pins in the lock to slide to the end of the groove. A small tab on the outer surface of the shaft prevents the pins in the lock from pushing the key out and works with the hollow center to guide the key as it is turned.

The modern version of this type of key is harder to duplicate as it is less common and requires a different machine from regular keys. These keys are most often seen in home alarm systems, vending machine
Vending machine
A vending machine is a machine which dispenses items such as snacks, beverages, alcohol, cigarettes, lottery tickets, consumer products and even gold and gems to customers automatically, after the customer inserts currency or credit into the machine....

s, laptop locks, and bicycle lock
Bicycle lock
A bicycle lock is a physical security device used on a bicycle to prevent theft. It is generally used to fasten the bicycle to a bicycle stand or other immovable object....

s, in the United States. These keys typically come in seven and eight-pin versions as well as miniature versions which are used on computers. Tubular keys were invented by the Ace lock company in Chicago.

Zeiss key

A Zeiss key (also known as a Cruciform key) is a cross between a house key and a tubular key. It has three sets of teeth at 90 degrees to each other with a flattened fourth side. Though this type of key is easy to duplicate, the extra sets of teeth deter lockpicking attempts.

Do Not Duplicate key

A Do Not Duplicate key (or DND key, for short) is one that has been stamped "do not duplicate", "duplication prohibited" or similar by a locksmith or manufacturer as a passive deterrent to discourage a retail key cutting service from duplicating a key without authorization or without contacting the locksmith or manufacturer who originally cut the key. More importantly, this is a key control
Key control
Key Control refers to various methods for making sure that certain keys are only used by authorized people. This is especially important for master key systems with lots of users....

 system for the owner of the key, such as a maintenance person or security guard, to identify keys that should not be freely distributed or used without authorization. Though it is intended to prevent unauthorized key duplication, copying DND keys remains a common security problem. There is no direct legal implication in the US for someone who copies a key that is stamped do not duplicate (unless it is an owned key), but there are patent restrictions on some key designs (see "restricted keys"). The Associated Locksmiths of America
Associated Locksmiths of America
The Associated Locksmiths of America , Inc., is the world’s largest organization for locksmiths and other physical security professionals....

, ALOA, calls DND keys "not effective security", and "deceptive because it provides a false sense of security."

United States Code 18 USC Sec. 1704 deals with United States Post Office keys, and 18 USC Sec. 1386 deals with United States Department of Defense keys.

Restricted key

A restricted keyblank is a keyway and blank for which a manufacturer has set up a restricted level of sales and distribution. Restricted keys are often protected by patent, which prohibits other manufacturers from making unauthorized productions of the key blank. In many cases, customers must provide proof of ID before a locksmith will cut additional keys using restricted blanks. These days, many restricted keys have special in-laid features, such as magnets, different types of metal, or even small computer chips to prevent duplication. Restriction keys are frequently used in automobiles, such as spare keys that allow entrance into the automobile but will not start the engine.

Magnetic key

A magnetic keyed lock is a locking mechanism whereby the key utilizes magnets as part of the locking and unlocking mechanism.

A magnetic key would use from one to many small magnets oriented so that the North / South Poles would equate to a combination to push or pull the lock's internal tumblers thus releasing the lock. This is a totally passive system requiring no electricity or electronics to activate or deactivate the mechanism. Using several magnets at differing polarity / orientations and different strengths can allow thousands of different combinations per key.

Keycard

A keycard is a flat, rectangular plastic card with identical dimensions to that of a credit card
Credit card
A credit card is a small plastic card issued to users as a system of payment. It allows its holder to buy goods and services based on the holder's promise to pay for these goods and services...

 or driver's license
Driver's license
A driver's license/licence , or driving licence is an official document which states that a person may operate a motorized vehicle, such as a motorcycle, car, truck or a bus, on a public roadway. Most U.S...

 which stores a physical or digital signature which the door mechanism accepts before disengaging the lock.

There are several popular type of keycards in use including the mechanical holecard
Keycard lock
A keycard lock is a lock operated by a keycard, a flat, rectangular plastic card with identical dimensions to that of a credit card or American driver's license which stores a physical or digital signature which the door mechanism accepts before disengaging the lock.There are several popular type...

, bar code, magnetic stripe, Wiegand wire embedded cards, smart card
Smart card
A smart card, chip card, or integrated circuit card , is any pocket-sized card with embedded integrated circuits. A smart card or microprocessor cards contain volatile memory and microprocessor components. The card is made of plastic, generally polyvinyl chloride, but sometimes acrylonitrile...

 (embedded with a read/write electronic microchip
Integrated circuit
An integrated circuit or monolithic integrated circuit is an electronic circuit manufactured by the patterned diffusion of trace elements into the surface of a thin substrate of semiconductor material...

), and RFID proximity cards.

Keycards are frequently used in hotel
Hotel
A hotel is an establishment that provides paid lodging on a short-term basis. The provision of basic accommodation, in times past, consisting only of a room with a bed, a cupboard, a small table and a washstand has largely been replaced by rooms with modern facilities, including en-suite bathrooms...

s as an alternative to mechanical keys.

History of locks and keys

Wooden locks and keys were in use as early as 4,000 years ago in Egypt. It is also said that key was invented by Theodore of Samos in the 6th century BC.

In the United States, keys have been seen as a symbol of power since colonial times. When William Penn
William Penn
William Penn was an English real estate entrepreneur, philosopher, and founder of the Province of Pennsylvania, the English North American colony and the future Commonwealth of Pennsylvania. He was an early champion of democracy and religious freedom, notable for his good relations and successful...

 arrived in Delaware 1682, a very elaborate ceremony was carried out where he was given the key to the defense works.

Flat metal keys proliferated in the early 20th century, following the introduction of mechanical key duplicators, which allow easy duplication of such keys.

Key duplication

Key cutting (after cutting, the metalworking term for "shaping by removing material") is the primary method of key duplication: a flat key is fitted into a vise
Vise
Vise may refer to:* Miami Vise, a defunct AFL team* Vise , a mechanical screw apparatus* Vise , an architectural element* Venus In-Situ Explorer * The Vise, TV show* Visé, BelgiumPeople with the surname Vise:...

 in a machine, with a blank attached to a parallel vise, and the original key is moved along a guide, while the blank is moved against a wheel, which cuts it. After cutting, the new key is deburred: scrubbed with a metal brush to remove burrs, small pieces of metal remaining on the key, which, were they not removed, would be dangerously sharp and, further, foul locks.

Different key cutting machines are more or less automated, using different milling or grinding equipment, and follow the design of early 20th century key duplicators.

Key duplication is available in many retail hardware stores and of course as a service of the specialized locksmith, though the correct key blank may not be available.

Certain keys are designed to be difficult to copy, for key control
Key control
Key Control refers to various methods for making sure that certain keys are only used by authorized people. This is especially important for master key systems with lots of users....

, such as Medeco
Medeco
Medeco is a lock manufacturer. Both the factory and administrative offices are located in Roanoke County, Virginia near Salem. Medeco is a subsidiary of the Swedish Assa Abloy Group.- History :...

, while others are simply stamped Do Not Duplicate to advise that key control is requested, but in the US, this disclaimer has no legal weight.

Rather than using a pattern grinder to remove metal, keys may also be duplicated with a punch machine. The key to be duplicated is measured for the depth of each notch with a gauge and then placed into a device with a numeric slider. The slider is adjusted to match the corresponding measured depth and a lever is depressed, which cuts the entire notch at once. As the lever is raised the key automatically advances to the next indexed position and the slider is adjusted appropriately to the next measured depth. This cycle is continued until the key is complete.

Duplicating keys by this process is more labor intense and requires somewhat better trained personnel. However, keys made in this fashion have clean margins and the depth of the notches are not subject to wear induced changes encountered when heavily worn keys are duplicated using a pattern grinder. Keys may also be made in this fashion without an original as long as the depth of each notch and the type of key blank are known. This is particularly useful for institutions with a great number of locks for which they do not want to maintain a wide variety of archived copies.

A machine permitting rapid duplication of flat metal keys, which contributed to the proliferation of their use during the 20th century, may have been first invented in the United States
United States
The United States of America is a federal constitutional republic comprising fifty states and a federal district...

 in 1917 (image to the left):
In recent years, dual key cutting machines have come on to the market, enabling cutting of both mortice and cylinder keys on one machine. These machines are primarily manufactured in the Far East and save a key cutter a significant amount of money compared with using two separate dedicated machines.

Popular culture

Keys appear in various symbols and coats of arms, the most well-known being that of the Vatican
Vatican City
Vatican City , or Vatican City State, in Italian officially Stato della Città del Vaticano , which translates literally as State of the City of the Vatican, is a landlocked sovereign city-state whose territory consists of a walled enclave within the city of Rome, Italy. It has an area of...

 – derived from the story of Saint Peter
Saint Peter
Saint Peter or Simon Peter was an early Christian leader, who is featured prominently in the New Testament Gospels and the Acts of the Apostles. The son of John or of Jonah and from the village of Bethsaida in the province of Galilee, his brother Andrew was also an apostle...

, the first Pope
Pope
The Pope is the Bishop of Rome, a position that makes him the leader of the worldwide Catholic Church . In the Catholic Church, the Pope is regarded as the successor of Saint Peter, the Apostle...

, being given the Keys of Heaven.

See also

  • Advanced key
    Advanced Key
    Smart key is an electronic access and authorization system which is available as an option or standard in several cars. It was first used by Mercedes-Benz in 1998.-How it works:...

  • Key (cryptography)
    Key (cryptography)
    In cryptography, a key is a piece of information that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the particular transformation of plaintext into ciphertext, or vice versa...

  • Passphrase
    Passphrase
    A passphrase is a sequence of words or other text used to control access to a computer system, program or data. A passphrase is similar to a password in usage, but is generally longer for added security. Passphrases are often used to control both access to, and operation of, cryptographic programs...

  • Password
    Password
    A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource . The password should be kept secret from those not allowed access....

  • Personal Identification Number
    Personal identification number
    A personal identification number is a secret numeric password shared between a user and a system that can be used to authenticate the user to the system. Typically, the user is required to provide a non-confidential user identifier or token and a confidential PIN to gain access to the system...

  • Personal Unblocking Code
    Personal Unblocking Code
    A PIN Unlock Code , also known as a PIN Unlock Key , is used in GSM mobile phones and some smartcards to unblock a blocked card.Most mobile telephones offer the feature of personal identification number protection...


External links


The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK