[ale] emailing public dsa key (good, bad or ugly?)

Robert Reese ale at sixit.com
Thu Jan 26 13:01:09 EST 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

*********** REPLY SEPARATOR  ***********
On 1/25/2006 at 10:19 PM Joe Knapka wrote:

>> is there any risk in doing this via email?  I understand the basic 
>> principles of asymetric cryptography and that it shouldn't be possible 
>> to decrypt w/the public key.
>
>Sure it is. You can decrypt any message encrypted with the private key.
>
...
>
>Wait...  *You* will be sending data to *them*? In that case, you need 
>*their* public key,
>not the other way around.  The public key is the one you encrypt with if 
>you want your
>message to stay private;  the private key is the one you encrypt with if 
>you want the receiver to be able to verify your identity.


Just for reference, you encrypt to a public key and verify a signature with a public key.  With a private key you decrypt and you sign. ;c)

Cheers,
Robert~


-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.4 (Build 4042)
Comment: No one has the right to not be offended!

iQA/AwUBQ9kOZrw8BOWncaQMEQIe6ACgxnY+R0EFIjS/glyRM6Cfzgf4wjcAoMuh
Oy/8mbSH8L8vNJ/K17g+ejV2
=DGt9
-----END PGP SIGNATURE-----



More information about the Ale mailing list