answersLogoWhite

0


Best Answer

The exact mathematics of the encryption differ depending on the algorithm used, but in principle, this is how it works.

An algorithm is used to generate a pair of keys that are related mathematically. In many cases they are factors of a very large number. One of the keys is the Public key, which is published to a key registry. The other is the Private key which is held by the owner alone. The important thing is that it is supposed to be impossible to derive the Private key from the Public key. When the owner wants to send a message, the use the Private key to encrypt it or to sign it. Since only the corresponding Public key can decrypt it, that establishes that the sender is who they say they are (because only they should have the Private key). If the sender used their Private key to sign the message, the receiver can use the Public key verify that the message has not been tampered with. On the flip side, some can encrypt a message to the owner of the Private key by using that person's Public key. Only the holder of the Private key can decrypt the message. This can provide confidentiality. Two correspondents can establish secure communications by using each others Public keys to encrypt their messages.

Often the public key is deposited with a trusted Certificate Authority. Assuming the user trusts the key repository, they can use them to authenticate the key they are using as belonging to the person it is supposed to belong to.

To get more details on the mathematics of encryption and decrption using Public Key

Encryption, aka asymmetric encryption. Do a web search for the particular algorithm involved, be it SSH, PGP, TLS, or some other protocol.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

9y ago

In public key cryptography there are two parts: 1) secret part 2) public part ,in order for p1 to send p2 a message ,p1 first need to obtain p2's public key and using this key encrypts the message then p2 using his secret key decrypts the message. And in private key cryptograhy there is only one key so in order for p1 to send a message to p2, p1 should firstly ask p2 for his key then encrypt the message using that key and then p2 uses the same key to decrypt the message.

This answer is:
User Avatar

User Avatar

Wiki User

9y ago

In public key cryptography there are two parts: 1) secret part 2) public part in order for p1 to send p2 a message ,p1 first need to obtain p2's public key and using this key encrypts the message then p2 using his secret key decrypts the message.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How does Public Key Encryption work?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Public key encryption is also known as asymmetric encryption?

Yes. Public Key encryption (or asymmetric encryption) requires a pair of keys; a public and a private key for exchanging data in a secure manner.


Private key encryption safer than public key?

No, Public key cryptography is safer than Private key Cryptography. In public key cryptography only only one part of key is visible to others.


To accurately transmit an electronic message the sender needs to know one code and the receiver needs to know a different one. what online security measure is being used?

It is the Public Key Encryption. A user using the Public Key Encryption has to have both a private key and a public key to send a secured message. The private key is used to unlock both a private and a public key encryption. A public key cannot unlock a private encryption.


What kind of encryption uses the concept of public keys?

Asymmetric encryption employs the use of public/private key pairs.


Is knapsack algorithm is a public key encryption algorithm?

yes


How many keys are required for public key encryption?

two


Which part of the encryption mechanism is transferred and exchanged?

the public key


Most encryption software products use a method called?

Public-Key Encryption RSA Technology


The combination of a public key and a private key is known as a?

This is known as RSA encryption. Encryption involving a public and private key combination is known as asynchronous cryptography, as opposed to synchronous cryptography. It is also known as public key cryptography. RSA is an algorithm that may be used (but there are others that can be used), in public key cryptography. (A key pair)


What is a crucial technology for e-commerce and email?

Public Key Encryption


What is used to decrypt a file in asymmetric encryption?

A public and private key


Is a crucial technology for e-commerce and email?

Public Key Encryption