[ale] emailing public dsa key (good, bad or ugly?)
Robert Reese
ale at sixit.com
Thu Jan 26 13:01:09 EST 2006
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
*********** REPLY SEPARATOR ***********
On 1/25/2006 at 10:19 PM Joe Knapka wrote:
>> is there any risk in doing this via email? I understand the basic
>> principles of asymetric cryptography and that it shouldn't be possible
>> to decrypt w/the public key.
>
>Sure it is. You can decrypt any message encrypted with the private key.
>
...
>
>Wait... *You* will be sending data to *them*? In that case, you need
>*their* public key,
>not the other way around. The public key is the one you encrypt with if
>you want your
>message to stay private; the private key is the one you encrypt with if
>you want the receiver to be able to verify your identity.
Just for reference, you encrypt to a public key and verify a signature with a public key. With a private key you decrypt and you sign. ;c)
Cheers,
Robert~
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.4 (Build 4042)
Comment: No one has the right to not be offended!
iQA/AwUBQ9kOZrw8BOWncaQMEQIe6ACgxnY+R0EFIjS/glyRM6Cfzgf4wjcAoMuh
Oy/8mbSH8L8vNJ/K17g+ejV2
=DGt9
-----END PGP SIGNATURE-----
More information about the Ale
mailing list