answersLogoWhite

0

When you reference a "public key" you are implying that the file has been encrypted using "asymmetric cryptography". In asymmetric cryptography, encryption and decryption depend on a key PAIR. The user retains their private key and publishes their public key. Anyone can encrypt a file using the user's public key and send it to them. The only person who should be able to decrypt a file encrypted with that public key is the holder of the private key - which, unless the user has made the mistake of sharing their private key - means that only the original user can decrypt the messages sent to them. Most of the asymmetric encryption algorithms use pretty much the same method to decrypt that was used to encrypt, but use the "other" key from the key pair. Messages encrypted using the private key can only be decrypted using the public key - which provides some authentication that the message indeed came from the holder of the private key. Messages encrypted using the public key can only be decrypted by the holder of the private key, so messages sent to them should be secure.

User Avatar

Wiki User

14y ago

What else can I help you with?

Continue Learning about Computer Science

What can only be encrypted with a public key and decrypted with a private key?

When one key is used for encryption and a different key is used for decryption this is call asymmetric cryptography. A good example of this is PGP (pretty good privacy). PGP is used to secure email. It accomplishes this by generating a pair of keys for each user. After the keys have been generated each user shares one key their public key and keeps their privet key secret. When someone wants to email a person who is using PGP they encrypt their message with the recipient's public key. This ensures that the message cannot be snooped on during transit and that only the person who has the corresponding privet key can decrypt the message.


What does A web feed refers to?

a service that notifies users that new content has been added to a website


How does Public Key Encryption work?

The exact mathematics of the encryption differ depending on the algorithm used, but in principle, this is how it works. An algorithm is used to generate a pair of keys that are related mathematically. In many cases they are factors of a very large number. One of the keys is the Public key, which is published to a key registry. The other is the Private key which is held by the owner alone. The important thing is that it is supposed to be impossible to derive the Private key from the Public key. When the owner wants to send a message, the use the Private key to encrypt it or to sign it. Since only the corresponding Public key can decrypt it, that establishes that the sender is who they say they are (because only they should have the Private key). If the sender used their Private key to sign the message, the receiver can use the Public key verify that the message has not been tampered with. On the flip side, some can encrypt a message to the owner of the Private key by using that person's Public key. Only the holder of the Private key can decrypt the message. This can provide confidentiality. Two correspondents can establish secure communications by using each others Public keys to encrypt their messages. Often the public key is deposited with a trusted Certificate Authority. Assuming the user trusts the key repository, they can use them to authenticate the key they are using as belonging to the person it is supposed to belong to. To get more details on the mathematics of encryption and decrption using Public Key Encryption, aka asymmetric encryption. Do a web search for the particular algorithm involved, be it SSH, PGP, TLS, or some other protocol.


Can you compare freeware shareware and public domain?

shareware is a licensed product and only documentation is available but in any case you have to purchase. but on the other hand, freeware is a trial basis/or free of cost . shareware is a licensed product and only documentation is available but in any case you have to purchase. but on the other hand, freeware is a trial basis/or free of cost . Both are programs. Freeware is free forever where shareware may ask for a voluntary donation or upgrade to a "premium" version of the program.


What is feeware?

Freeware is usually referred to software that has been made available to the general public at no cost as long as the user agrees with the creators terms of license. Open source programs are also called freeware programs and are licensed under GNU agreement. Open Source/ Freeware programmers may encourage users to distribute the piece of software as long as it is done without any fee. Shareware on the other hand are softwares that must be purchased after a certain length trial period expires.

Related Questions

A user has encrypted important data files and now is no longer working for your company How do you decrypt these files so they can be read?

From the file's Properties dialog box ,click the Advanced button. In the Advanced Attributes dialog box, uncheck Encrypt contents to secure data


Difference between encrypted file and password?

encrypted file - a file that has been rendered unreadable by encryption, it still contains the same information but cannot be read until decryptedpassword - a secret word used to prove that one has permission to go someplace or read certain thingsSometimes the word password is used to refer to the keyword used to encrypt/decrypt things.


Is the public key more secure than private key?

The questions is not really which key is more secure - rather it is a question of "can you determine the private key if you know the public key?" Public and private keys are associated with asymmetric cryptography. They are generated as a pair. The security comes from the difficulty in determining the private key if you already know the public key and have some cyphertext that the private key has been applied to or encrypting text with the public key and determining what key would be required to decrypt it. Since each key can be used to decrypt cyphertext encrypted with the other key using the same algorithm, there is not inherent reason to think that one key is more secure than the other. In reality, one of the keys will be numerically a better starting point than the other when it comes to executing an attack on the encryption and deriving the other key. In practical terms, however, an attacker is always trying to start with the public key and discover the private key, without which messages encrypted with the public key cannot be decrypted (or without which the attacker cannot impersonate the holder of the private key).


How many keys are utilized in asymmetric encryption?

Asymmetric encryption uses at least 2 keys - hence the asymmetry. The keys for encryption and decryption are not the same, so they are not "symmetric". Usually only 2 keys are used - a public key and a private key. The public key is published to a key registry or sent separately to those the key-pair owner wants to communicate with. The private key is retained by the owner. Messages encrypted with the private key can only be decrypted using the public key. If the source of the public key is trusted, this provides some proof of the source of the message. Messages encrypted with the public key can only be decrypted using the private key - so only the owner of the private key should be able to decrypt messages encrypted with their own private key.


Is there a way algorithm to encrypt more numbers in one number and can decrypt?

Yes, there are several algorithms for data compression, that is, store data in less space than it usually needs. However, not all data can be encrypted. Encryption basically takes advantage of some sort of repetition in data; once all repetition has been eliminated, data can be encrypted no more.Yes, there are several algorithms for data compression, that is, store data in less space than it usually needs. However, not all data can be encrypted. Encryption basically takes advantage of some sort of repetition in data; once all repetition has been eliminated, data can be encrypted no more.Yes, there are several algorithms for data compression, that is, store data in less space than it usually needs. However, not all data can be encrypted. Encryption basically takes advantage of some sort of repetition in data; once all repetition has been eliminated, data can be encrypted no more.Yes, there are several algorithms for data compression, that is, store data in less space than it usually needs. However, not all data can be encrypted. Encryption basically takes advantage of some sort of repetition in data; once all repetition has been eliminated, data can be encrypted no more.


How can you find out your icription code?

The following steps will help you: # Learn to spell encryption. # Figure out which encryption code it is that you want decrypted, because there are millions of possible things to encrypt. # Figure out how the thing that you want decrypted IS encrypted; i.e. which algorithm has been used to encrypt the data. # Get a program that already knows how to decrypt something that uses said algorithm. If you find such a program, go to step 8. If you can not obtain a program that is able to decrypt that data, go to step 5. # Learn to program. # Study mathematics and learn about cryptography. # If it is theoretically possible to decrypt the data you want to decrypt, write a program that will do so, with your years of cryptographic research. If it is not theoretically possible to do so, with a classical computer, study physics and get your PhD and work on Quantum Computation until they invent a QC that can crack the encrypted data, and write the program that can run on the QC, which of course relies on a whole new branch of mathematics and physics. # Use the program you've obtained/written to crack the encryption. # ... # Profit!


How can you find out your code?

The following steps will help you: # Learn to spell encryption. # Figure out which encryption code it is that you want decrypted, because there are millions of possible things to encrypt. # Figure out how the thing that you want decrypted IS encrypted; i.e. which algorithm has been used to encrypt the data. # Get a program that already knows how to decrypt something that uses said algorithm. If you find such a program, go to step 8. If you can not obtain a program that is able to decrypt that data, go to step 5. # Learn to program. # Study mathematics and learn about cryptography. # If it is theoretically possible to decrypt the data you want to decrypt, write a program that will do so, with your years of cryptographic research. If it is not theoretically possible to do so, with a classical computer, study physics and get your PhD and work on Quantum Computation until they invent a QC that can crack the encrypted data, and write the program that can run on the QC, which of course relies on a whole new branch of mathematics and physics. # Use the program you've obtained/written to crack the encryption. # ... # Profit!


What is encrypted or scrambled data?

Encrypted or scrambled data refers to information that has been transformed using a specific algorithm to make it unreadable to unauthorized users. This process ensures that only individuals with the correct decryption key can access the original content. Encryption is commonly used to protect sensitive information, such as personal data and financial transactions, from unauthorized access and cyber threats.


What is mean by Encrypted hard disk?

An encrypted hard disk is a disk that has been coded in order for it not to be burned.


What can only be encrypted with a public key and decrypted with a private key?

When one key is used for encryption and a different key is used for decryption this is call asymmetric cryptography. A good example of this is PGP (pretty good privacy). PGP is used to secure email. It accomplishes this by generating a pair of keys for each user. After the keys have been generated each user shares one key their public key and keeps their privet key secret. When someone wants to email a person who is using PGP they encrypt their message with the recipient's public key. This ensures that the message cannot be snooped on during transit and that only the person who has the corresponding privet key can decrypt the message.


Compare public key cryptography and Symmetric key cryptography?

In public key cryptography there are two parts: 1) secret part 2) public part ,in order for p1 to send p2 a message ,p1 first need to obtain p2's public key and using this key encrypts the message then p2 using his secret key decrypts the message. And in private key cryptograhy there is only one key so in order for p1 to send a message to p2, p1 should firstly ask p2 for his key then encrypt the message using that key and then p2 uses the same key to decrypt the message.


What is triple encryption?

For some time it has been common practice to protect and tansport a key for DES encryption with triple-DES (3DES). The function follows an encrypt-decrypt-encrypt (EDE) sequence. Decrypt sequence is simply the same (encrypt) operation with the keys reversed.