I'm struggling with trying to understand how encryption works the way it does.
I remember an apology where myself and Lucy want to exchange an encrypted message.
We both have private keys and one shared public key.
I use my message and encrypt it using a private key, then use my public key on it and send it to Lucy. She does the same. Then somehow we can decrypt the message??? I don't understand how this works.
At the end of the day, how is it possible that someone monitoring the network can't decrypt the message?
>>7690487
An analogy*
The public key is used to encrypt a message.
Only the private key in that public/private key pair can decrypt messages encrypted with its public key.
You and Lucy would each have your own keypair and keep your private keys secret. You would each use the other's public key to encrypt messages and use your own private key to decrypt messages sent to you.
>>7690492
Thanks, that thread is interesting!
>>7690487
read a book on it
http://4chan-science.wikia.com/wiki/Computer_Science_and_Engineering#Computer_Security_and_Cryptography
Diffie-Hellman and the discrete logarithm?
I don't have time to go into how or why this works (that would take hours). But just do some reading on discrete logarithms, quadratic reciprocity, and really anything else tangentially related.
>>7690487
Saw this in another thread op
Thanks to whoever answered the RSA question I had in the other thread, but I have another one now :
If I understood correctly, https uses RSA in some way, so does your browser check the security key of a website you access the first time you visit it, and warn you if it isn't the same one the next time ?
Some guy told me that you receive RSA public keys from a special authority throught RSA too, is it true ? If so, is there the same issue as before if it's the first time you make contact with the authority ?
Hopeful bump
Hopeless bump