Contents - Keywords - Search || InstantCrypt Home - Previous - Next


Cryptography Concise

 Mathematical Foundation

 


1. 

Every participant has his own key pair.


2.

One key of this pair encrypts the message, which then can only be read by the other key of the same pair, and by no other key.


3.

This also works the other way around: what has been encrypted with the second key can be decrypted with the first.


4.

You cannot decrypt the message with the key that you have used for encryption.


5.

Knowing one key of a key pair does not help you to find the other one.

 Practical Use:

 


1. 

Every participant creates his or her own key pair.


2.

They keep one key of their key pair secret, e.g. protecting it with passphrase: this is their “private” or “secret” key.


3.

They give the other key to anyone who might want to send them an encrypted message, this key does not have to be kept secret: this is the “public” key.


4.

Participants collect the public keys of all the people to whom they want to send a message.


5.

If Alice wants to send a secret message to Bob, Alice uses Bob’s public key to encrypt the message and sends the message to Bob. Alice knows that only Bob with his private key can read it.

Advantage:

 


1. 

In traditional cryptography (with only a single key used for encryption and decryption), there is always the problem of the “key exchange”, i.e., the sender has to let the receiver know which key was used without anybody else being able to find out: the key exchange has to be secret. This is not always easy.


2.

In public-key cryptography, this problem has been solved: Everybody can know anybody’s public key and will still not be able to read messages directed to them, as long as the secret keys (which do not have to be exchanged) remain secret.