1,885
edits
Changes
SSH
,→Public Key Cryptography
# That number is used to derive two mathematically-related but different keys. Each key is also a large number.
# Data can be encrypted by processing one of the keys and the data to be encrypted using an encryption algorithm. Once encrypted, the data appears to be a meaningless stream of numbers.
# The encrypted data cannot be decrypted using the original key, yielding the original data. However, it can be decrypted using the other, related key, and vice-versa.
To use public key cryptography: