Thread: Encryption
View Single Post
Unread 1 Mar 2006, 09:20   #20
Radical Edward
Registered User
 
Join Date: Feb 2002
Location: South Pacific
Posts: 4,911
Radical Edward needs a job and a girlfriendRadical Edward needs a job and a girlfriendRadical Edward needs a job and a girlfriendRadical Edward needs a job and a girlfriendRadical Edward needs a job and a girlfriendRadical Edward needs a job and a girlfriendRadical Edward needs a job and a girlfriendRadical Edward needs a job and a girlfriendRadical Edward needs a job and a girlfriendRadical Edward needs a job and a girlfriendRadical Edward needs a job and a girlfriend
Re: Encryption

Quote:
Originally Posted by Androme2
The types of encryption commonly commonly used in relation to keys are single key (one key used to encrypt and decrypt) and double key encryption methods where-by one key is used to encrypt the message (public key) and another is used to decrypt it (private key). The public key is made available to everyone and the private key is kept 'private'. They aren't the same on the basis of extremely large prime numbers. Two prime numbers multiplied by each other = significantly larger number.

digital signiatures work the other way round - the encryption key is kept private and the decryption key is made public. so when you decrypt the message and see that it is what you expect it to be, then you can be sure that the person that encrypted it and sent it to you, is the person holding the private encryption key.
__________________
I think it's time we blow this scene, get everybody and the stuff together..........

ok 3..... 2..... 1.. let's jam
Radical Edward is offline   Reply With Quote