she1
asked on
If public key encrypts only private can decrypt and vice versa?
why we say "If public key encrypts only private can decrypt and vice versa" from the following? thanks
Public key cryptography
–Asymmetric – two inversely related keys
•Private key
•Public key
–If public key encrypts only private can decrypt and vice versa
–Each party has both a public and a private key
–Either the public key or the private key can be used to encrypt a message
–Encrypted with public key and private key
•Proves identity while maintaining security
•RSA public key algorithm www.rsasecurity.com
Public key cryptography
–Asymmetric – two inversely related keys
•Private key
•Public key
–If public key encrypts only private can decrypt and vice versa
–Each party has both a public and a private key
–Either the public key or the private key can be used to encrypt a message
–Encrypted with public key and private key
•Proves identity while maintaining security
•RSA public key algorithm www.rsasecurity.com
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
The public key encryption, uses a asymetric algorithm ... This means that pair keys are used and they exlude each other. If you encrypt data with one key, ONLY the other key can decrypt data. That's why, one of the keys is public the other one is private. The private key is never shared. The public key SHOULD BE SHARED. Therefore, there is no security issue here as the key is actually supposed to be PUBLIC.
One of the applications of the public key encryption, besides the encryption itself, is the use of digital signatures (by the way, the digital certificate is just a way to publish your public key and to ensure the public key is realy yours - this is where CA (certificate authorities) come in place - it's the same as someone is validtaing your passport). When you digitally sign a document, you apply the private key to it. Therefore, if you send the document to me, I must have your public key. As you can imagine, I can get your public key cause it's PUBLIC. Then I know, the message came indeed from you.
!!! All this info is put here in a simple way ... It might not look like, but it is!!!!
If you need further explanation, let me know.
Cheers.