An encrypted message requires the key pair to decrypt. So if I’m sending you a message I use your public key to encrypt, then you use your private key to decrypt. Only you have your private key. If I were going to sign something, rather than encrypt it, I would use my private key, then everyone could verify it was me by using my public key.
yeah I just don’t see how you can encrypt something with a key and not be able to decrypt it with the same key (I looked at the khan academy thing and have seen others. I never got the math around it).
An encrypted message requires the key pair to decrypt. So if I’m sending you a message I use your public key to encrypt, then you use your private key to decrypt. Only you have your private key. If I were going to sign something, rather than encrypt it, I would use my private key, then everyone could verify it was me by using my public key.
https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/public-key-encryption
yeah I just don’t see how you can encrypt something with a key and not be able to decrypt it with the same key (I looked at the khan academy thing and have seen others. I never got the math around it).