The way they explained things is how it works, do you not understand how public/private key pairs are used in encrypted communications?
Does this picture help?
I’m not trying to be an ass if my post comes across that way, I’m just unsure of your level of knowledge so I don’t want to offend by providing basic level info if it’s not wanted.
my experience with public/private keys is ssh where I have logins in both places and I login without keys and move it to the .ssh file. That is what gets me. how is the key moved over for communication and if the server moves it then it could theoretically hold onto it. So in the picture above it takes the public key in step 2 and sends it on in step 3 which is used to encrypt the message. I just don’t see how the public key in that case can encrypt the message but not decrypt it.
An encrypted message requires the key pair to decrypt. So if I’m sending you a message I use your public key to encrypt, then you use your private key to decrypt. Only you have your private key. If I were going to sign something, rather than encrypt it, I would use my private key, then everyone could verify it was me by using my public key.
yeah I just don’t see how you can encrypt something with a key and not be able to decrypt it with the same key (I looked at the khan academy thing and have seen others. I never got the math around it).
The way they explained things is how it works, do you not understand how public/private key pairs are used in encrypted communications?
Does this picture help?
I’m not trying to be an ass if my post comes across that way, I’m just unsure of your level of knowledge so I don’t want to offend by providing basic level info if it’s not wanted.
my experience with public/private keys is ssh where I have logins in both places and I login without keys and move it to the .ssh file. That is what gets me. how is the key moved over for communication and if the server moves it then it could theoretically hold onto it. So in the picture above it takes the public key in step 2 and sends it on in step 3 which is used to encrypt the message. I just don’t see how the public key in that case can encrypt the message but not decrypt it.
An encrypted message requires the key pair to decrypt. So if I’m sending you a message I use your public key to encrypt, then you use your private key to decrypt. Only you have your private key. If I were going to sign something, rather than encrypt it, I would use my private key, then everyone could verify it was me by using my public key.
https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/public-key-encryption
yeah I just don’t see how you can encrypt something with a key and not be able to decrypt it with the same key (I looked at the khan academy thing and have seen others. I never got the math around it).