And a private key can be used to “sign” a string of text or a document to prove mathematically that only the private key’s possessor could have signed it.īut there are two missing pieces that would let Mac, iOS, and other platforms’ users take advantage of PK. Anything encrypted by someone else with the public key can only be decrypted by having access to the corresponding private key. The public key can be freely distributed. It’s an effective system that has no known theoretical exploits, and currently deployed implementations are considered robust.Īnd to recap: The clever bit with the public-key approach is that you have two complementary keys, one public and one private. In our last episode of Private I, I explained the basics of public-key (PK) cryptography, a way to scramble messages in a way that only someone possessing a particular key can decrypt, without that key ever having to be publicly disclosed or shared.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |