![]() This symmetry between public keys and private keys does not extend to most other public-key cryptosystems. However, the results are not meaningful according to standard algorithms. (They don't have the same security properties, however - the public key is usually easily guessable from the private key.) You can take an RSA encryption algorithm and feed it a private key, or an RSA decryption algorithm and feed it a public key. With RSA, which is a popular public-key cryptosystem but not the only one, the private key and the public key have the same mathematical properties, so it is possible to use them interchangeably in the algorithms. Similarly, you cannot use a private key to encrypt a message or a public key to decrypt a message. ![]() Q: If you pedal backwards on a fish, does it go backwards?Ī fish is not a bicycle.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |