Public Key Encryption and Digital Signatures
If you are concerned about the privacy of your electronic documents and would like to make sure that only people who are authorized by you are actually able to read them, you have the option to use encryption.
Conventional methods of encryption use a so-called "key" to encrypt a document, and the person authorized to read it uses the same key to decrypt it, so it becomes readable again. This is fine as long as encryption and decryption are done at the same place, and the key is not at risk of being exposed. In order to eliminate the risk of compromising the key while sending it to the people that you want to enable to read your documents, mathematicians have devised a method where the keys for encryption and decryption are different, and knowing the key for encryption does not enable a person to decrypt a document. That is, if you want to enable your friend to send you confidential documents you would give him or her a key for encryption, and you keep the corresponding key for decryption safely on your site (for each "encryption key" there is a corresponding mathematically related "decryption key"). In fact, you can make the key for encryption public, so that anybody who wants to send you confidential documents can do so without first asking you for a key. That is why the key for encryption is called "public" key and the method is called "public key encryption".
Full Story.
- Login or register to post comments
- Printer-friendly version
- 1213 reads
- PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
digiKam 7.7.0 is releasedAfter three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release. |
Dilution and Misuse of the "Linux" Brand
|
Samsung, Red Hat to Work on Linux Drivers for Future TechThe metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world. Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility. |
today's howtos
|
Recent comments
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago
1 year 11 weeks ago