Home > Password > How Public Key Cryptography Works ?
How Public Key Cryptography Works ?
Posted on Monday, June 20, 2011 by Arman Zulhajar

The solution is to use an ingenious cryptographic system called public key cryptography (PKC). The fundamental part of PKC is that the encryption key is split into two separate keys—let’s call them key A and key B. If you encrypt some plaintext with key A, you can’t decrypt the resulting ciphertext with key A to get back to your original plaintext. To decrypt ciphertext produced using key A, you need to use key B. In fact—and this turns out to be very useful—the reverse is also true: if you encrypt some plaintext with key B, you can’t decrypt it again with that key. You can only decrypt it with key A. If you encrypt a message with one key in the key pair, you can only decrypt it with the other one.
If you want to be able to receive encrypted messages from anyone who wants to contact you, you frst need to generate a key pair (using suitable PKC software.) One of these you designate your private key, which you keep secret. But here’s the clever bit: the other key you designate as your public key, and this doesn’t have to be kept secret. In fact the reverse is true: it should be distributed as widely as possible so that anyone who wants it can easily get it.
To send that message to a colleague now, all you need is their public key. There are a number of ways that you might get might get hold it, which we will look at later. The important thing is that this public key doesn’t have to be kept secret, so even if you called your colleague and the phone line was being tapped it wouldn’t matter. Anyone overhearing the conversation and writing down the public key couldn’t use it to decrypt the message that you encrypt with it.
Now remember how we mentioned earlier that your private key can also be used to encrypt a message that can only be decrypted using your public key. You may well ask what would be the point of encrypting a message if the key needed to decrypt it is publicly available.
The answer is quite surprising. Let’s imagine you receive a message from your colleague, and you believe that it is encrypted with his private key. If you use their public key to decrypt the message successfully then that means that the message must indeed have been encrypted using your colleague’s private key (which only your colleague has access to). No other key could have been used to encrypt the mes-sage. So encrypting a message with a private key acts as a digital signature: If you can decrypt a message with John’s public key, it must have been encrypted using John’s private key, so it must have been written by John.
Using double encryption, it’s possible to send an encrypted, digitally signed message to anyone who has made their public key available. Here’s how:
Imagine you want to send a message to your colleague Bob at head offce. First you write your message (the plaintext) and encrypt it with your private key to produce the ciphertext—a message that is effectively digitally signed as coming from you and no one else. You then encrypt this ciphertext a second time using Bob’s public key. Finally, you e-mail the resulting gobbledegook to Bob.
One problem with symmetric systems
is that to send someone a message securely you have to be able to give them the secret key frst without anyone else seeing it.
When Bob receives this message he decrypts it using his private key to get the ciphertext message that you encrypted with your private key. Bob then decrypts this using your public key. If he gets a message (rather than gobbledegook) he knows that the message defnitely came from you (because otherwise he couldn’t have decrypted it with your public key) and he knows that no one else could have read the message, because no one else has his private key.
Category Article Cryptography, Password
Random Posts
-
In Angry Birds 2-14, you have 4 white Angry Birds that can drop explosive eggs. You must beat 4 pigs to pass this level. If you're look...
-
Using WiFi Access Point (WAP) is actually tricky. If you use a different modem and WAP brands such as TP Link modem and WAP SMC or Asus br...
-
Angry Birds 5-12 walkthroughs are so useful for you who need idea to beat Angry Birds 5-12 Mighty Hoax. Maybe, Angry Birds level 5-12 is ha...
-
My apologies to the vast majority who voted for a facebook page. I have read through the privacy policy on facebook and rushed to delete my ...
-
I have received a couple of emails asking about hair thinning and hair loss (not relaxer related but for natural hair). I am happy to do the...
Powered by Blogger.
Blog Archive
-
▼
2011
(3255)
-
▼
June
(184)
- Ghost Scepter - Dota Item
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Google Alert - Facebook Games News
- Etheral Blade - Dota Item
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Google Alert - FrontierVille Cheats Videos
- Isla Dorada Episode 1: The Sands of Ephranis [BETA]
- Midsummer creatures
- Download Dota Ringtone for Your Cellphone
- Google Alert - FrontierVille Latest Cheats
- Oddly Enough Pied Piper [BETA]
- Sphera [BETA]
- 4 Elements 2 [BETA]
- Cradle Of Egypt [BETA]
- Ninja Puzzle [FINAL]
- Urn of Shadows
- Mahjongg Artifacts 2 [FINAL]
- Nanda's Island [FINAL]-BFG
- QuadSmash [FINAL]
- The Microbie Story [FINAL]
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Herofy [FINAL]
- Garden Spirits [BETA]
- Google Alert - Facebook Games News
- Khadgar's Pipe of Insight
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Sandra Fleming Chronicles: The Crystal Skull [BFG-...
- Differences between HTML 4 and HTML5
- Increase Traffic to Your Blog
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Tales From The Dragon Mountain: The Strix [FINAL]
- Grim Facade: Mystery of Venice Collector’s Edition...
- Google Alert - FrontierVille Latest Cheats
- Camy Adventures - Episode 1 [FINAL]
- Google Alert - Facebook Games News
- What to Do When a Laptop is Stolen???
- Review: Cisco RV220W Wireless-N Network Security F...
- The Fall Trilogy: Chapter 3 - Revelation [FINAL]
- New Dota Hero: Ymir - Tuskarr
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Google Alert - FrontierVille Cheats Videos
- Val'Gor 2: The Beginning [FINAL]
- Jessica's 2 Dash Pack [FINAL]
- Virtual Farm 2 [FINAL]
- Jessica's Bow Wow Bistro [FINAL]
- Energy Vampires: Strange Comments and Emails
- Dota 6.70 Map Free for Download
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Ghost Towns: The Cats Of Ulthar [BETA]
- Mystery Valley: Extended Edition [FINAL]
- Blossoms at home
- Smoke of Deceit - New Dota Item on Dota 6.70
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- How Public Key Cryptography Works ?
- Protecting Your Sensitive Information with Encryption
- Ancient Janggo of Endurance - New Dota Item on Dot...
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Juliet's Fashion Empire [BETA1]
- Research time: What questions do you want answered?
- Medallion of Courage - New Dota Item on Dota 6.70
- The pilot outfit
- Veil of Discord - Dota Item
- Secrets of the Dark: Temple of Night Collector's E...
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Hello!
- Classic Fishdom 2 in 1 Pack [FINAL]
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Short vs Long
- Doodling while rendering....Looks like some animal...
- Grand Magnus (Rubick) - Dota Hero
- Hide and Secret 4: The Lost World [FINAL]
- Death Under Tuscan Skies: A Dana Knightstone Novel...
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- The perfect light conditions
- Short Natural Hair: The Flat Twist
- "7 Secrets of Internet Millionaires"
- Proactive Password Auditor
- Google Alert - FrontierVille Cheats
- Google Alert - FrontierVille Latest Cheats
- Puppy Sanctuary [BFG-FINAL]
- Bicycle Skat [FINAL]
- The Timebuilders 2: Caveman's Prophecy [FINAL]
- Echoes Of The Past 3: The Citadels Of Time [BETA]
- Google Alert - Facebook Games News
- Short Natural Hairstyles: Curly Chellez
- Download Dota Map 6.72c
- Angry Birds 1.5.2 [FINAL]
- It's not enough!
-
▼
June
(184)