![]() He then uses your public key (which he already has a copy of) to decrypt the encrypted portion, and he makes sure that it matches up with the plain text. You send your friend the message and the encrypted version of the message. Here's how that works: You write a message, and encrypt it with your private key (note, that usually the public key is used for encryption, but in the case of signing, we do the reverse). Signing - A way to proving that you wrote a message using your private key. You can take an input can get an output quickly and easily, but not the opposite.īitmessage Address - Essentially a hash of your public key As long as the hashing algorithm is secure, then there is no way to figure out the input used to get a given hash without brute forcing. Hashing algorithms are deterministic, meaning that the same data hashes to the same output every time. Hashing - This is basically one-way encryption. So, as an example, I can give my public key out to everybody, and they can use that to send me encrypted data that only I can decrypt as long as I keep my private key private. The keys are mathematically related such that data encrypted using the public key can only be decrypted using the private key. One key is used for encryption (called the public key), and the other is used for decryption (called the private key). A key is used to encrypt data, and then that same key can be used to decrypt it.Īsymmetric Encryption - Instead of a single key, you're dealing with a pair of two keys. Symmetric Encryption - This is classical encryption the way most people think of it. Well, let's start with talking about cryptography for a bit, along with a bit of other vocabulary: ![]() Taking out everyone using the network at the same time, would be the only way to take down the network. The whole network depends on each individual sharing and fowarding other people's messages so that it doesn't rely on each person too much. ![]() Finding out who has the key to a given encrypted mail is nearly impossible. Since the messages are actually thousands upon thousands every hour, and since we have many users around the globe, figuring out who created the messages is very very hard (anonymity). We also get encrypted messages that other people have. We forward everything else to other people. We have some keys that we could try to see if any of them is for us. So, we all share everyone's messages with each other. We then lump that in with all the other chests that look identical from the outside, and no one could tell I actually made that chest, and that it is going to my (totally hardcore) granny. Suppose if we wanted to secretly deliver the mail for our granny, we just make a chest that only granma can open. You clone them (chests) and you forward them to some other person Why? Because everyone else also shares their unopened chests with you, and if you don't do this, the chest delivery network won't work for long. Whenever you get a locked chest, you try all your keys to see if any of them were for you. Also imagine you have a cloning machine (copy/paste) and a set of keys (keys). Imagine you get about 10 locked chests (encrypted messages) every day. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |