Overview#

In Asymmetric Key Cryptography encryption and decryption, each participant possesses a private and a public key.

Messages encrypted with the Private Key can only be decrypted with the corresponding Public Key.

Messages encrypted with the Public Key can only be decrypted with the corresponding Private Key.

Participants keep their Private Keys and distribute their Public Keys to other participants.

When one participant wants to send a secure message to another, the message is encrypted with the other person's Public Key and sent. This is safe because the only person that can decrypt the message is the one who has the Private Keys.

The other person can then send a secure message back to the first person by using the first person's Public Key. Only the person with the Private Keys can decrypt the message and that will be the first person.

Asymmetric key encryption/decryption is particularly suited to network communication because of the ease in which keys can be securely distributed.

Alice and Bob#

Public key shared secret
.

More Information#

There might be more information for this subject on one of the following:

Add new attachment

Only authorized users are allowed to upload new attachments.

List of attachments

Kind Attachment Name Size Version Date Modified Author Change note
png
Public_key_shared_secret.svg.p... 107.2 kB 1 17-Oct-2015 11:56 jim Alice and Bob Public Key Shared Secret
« This page (revision-6) was last changed on 13-Dec-2015 12:25 by jim