Basic asymmetric crypto question + can you do this with crypto?

  • Thread starter Thread starter cool_arrow
  • Start date Start date
cool_arrow
Messages
4
Reaction score
0
Hi. Crypto noob here learning a little about the subject lately and I have some questions:

1) If I am using public key cryptography (like openpgp) and I encrypt a message for a recipient using their public key, can I decrypt that message using my private key in the future?

2) Does a method of asymmetric cryptography exist that allows one to generate public and private key pairs based on a "master" key such that the "master" can always decrypt anything encrypted with the keys generated/computed from it?

The reason I ask these questions is that I am wondering if there exists a cryptographic method whererby a hierarchy of keys can be created such that any private key can be used to generate any number of public/private key pairs and any message encrypted using these keys derived from the "master" can not only be decrypted by the recipient (of course), but also by the "master" keys from which it was derived.

Does something like this currently exist? Any info is appreciated.
 
Mathematics news on Phys.org
cool_arrow said:
1) If I am using public key cryptography (like openpgp) and I encrypt a message for a recipient using their public key, can I decrypt that message using my private key in the future?
No. Why would you ever have to do that, considering you would have the plaintext to begin with?

2) Does a method of asymmetric cryptography exist that allows one to generate public and private key pairs based on a "master" key such that the "master" can always decrypt anything encrypted with the keys generated/computed from it?
This does not make sense. The public/private keys are a pair- if something is encrypted with your public key, you can decrypt it with your private key and VV. There is no need for a "master" key.


The reason I ask these questions is that I am wondering if there exists a cryptographic method whererby a hierarchy of keys can be created such that any private key can be used to generate any number of public/private key pairs and any message encrypted using these keys derived from the "master" can not only be decrypted by the recipient (of course), but also by the "master" keys from which it was derived.

Does something like this currently exist? Any info is appreciated.

Sounds like key escrow to me. In that case you'd just give the private key to the trusted escrow authority...like the US Government! Oh, wait...
 
thanks fss. I think I'm clear on how it works now.
 
Insights auto threads is broken atm, so I'm manually creating these for new Insight articles. In Dirac’s Principles of Quantum Mechanics published in 1930 he introduced a “convenient notation” he referred to as a “delta function” which he treated as a continuum analog to the discrete Kronecker delta. The Kronecker delta is simply the indexed components of the identity operator in matrix algebra Source: https://www.physicsforums.com/insights/what-exactly-is-diracs-delta-function/ by...
Fermat's Last Theorem has long been one of the most famous mathematical problems, and is now one of the most famous theorems. It simply states that the equation $$ a^n+b^n=c^n $$ has no solutions with positive integers if ##n>2.## It was named after Pierre de Fermat (1607-1665). The problem itself stems from the book Arithmetica by Diophantus of Alexandria. It gained popularity because Fermat noted in his copy "Cubum autem in duos cubos, aut quadratoquadratum in duos quadratoquadratos, et...
Thread 'Imaginary Pythagorus'
I posted this in the Lame Math thread, but it's got me thinking. Is there any validity to this? Or is it really just a mathematical trick? Naively, I see that i2 + plus 12 does equal zero2. But does this have a meaning? I know one can treat the imaginary number line as just another axis like the reals, but does that mean this does represent a triangle in the complex plane with a hypotenuse of length zero? Ibix offered a rendering of the diagram using what I assume is matrix* notation...

Similar threads

Back
Top