Open main menu

CDOT Wiki β

Changes

SSH

9 bytes removed, 01:39, 9 January 2011
Public Key Cryptography
# That number is used to derive two mathematically-related but different keys. Each key is also a large number.
# Data can be encrypted by processing one of the keys and the data to be encrypted using an encryption algorithm. Once encrypted, the data appears to be a meaningless stream of numbers.
# The encrypted data cannot be decrypted using the original key, yielding the original data. However, it can be decrypted using the other, related key, and vice-versa.
To use public key cryptography: