Public Key Cryptography
- Tags
- cryptography
Refers to a standard for sharing secure correspondences between a sender and a recipient using asymmetric-key encryption.
Procedure
- [see page 24, Distribute public keys]. Assume that every involved party can access the public key of a host because it's been publicly announced somehow. You can receive better security by adding your keys to a publicly available directory or getting a certified authority to give you a key.
- Sign what you want to transmit with your private key.
- Encrypt the signed message with the recipients public key.
The recipient can then retrieve and verify the original message is yours by:
- Decrypting transmission with their private key.
- Verify the signature of the decrpyted contents with senders public key.
Note: \(R\) in the diagram above is a random number, nonce.