Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

How does public-key cryptography work?

0
Posted

How does public-key cryptography work?

0

To use public-key cryptography, you need a “key pair,” made up of a “public key” and a “private key.” The public key should be made publicly available, but only you ever need to know your private key. The two keys in this key pair are related so if one key encrypts a message, only the other key from that unique key pair can decrypt it. This means that a message encrypted with your public key can’t be decrypted with that same public key. It’s also next to impossible to use your public key to figure out your private key. It would take a supercomputer decades to compute a private key from a public key. Private keys can be kept on a computer’s hard drive, encrypted with a password or stored on cards used with a special reader connected to a computer. • What information should be encrypted? Many messages crossing the Internet don’t need to be encrypted. For example, L.L Bean and one of its customers wouldn’t need to conceal from “snoopers” the number and size of socks you’re ordering, but t

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.