Cryptography, public key and private key

  • Thread starter Thread starter fisico30
  • Start date Start date
  • Tags Tags
    Cryptography
Click For Summary
In the context of Alice sending a secret message to Bob, Alice must encrypt the message to ensure its security. The public key is typically issued by Bob, allowing Alice to encrypt her message. Bob then uses his private key to decrypt the message once it is received. The discussion highlights the importance of understanding the roles of public and private keys in secure communication. Additionally, it suggests consulting reliable sources like Wikipedia for further information on public and private key concepts.
fisico30
Messages
362
Reaction score
0
Hello Forum,

If Alice wants to send a secret message to Bob, she has to encrypt it first to keep the message secure.

Who issues the public key in this case and who uses the private key?

thanks
fisico30
 
Technology news on Phys.org
Have you checked usual sources, like wikipedia? Or any pages shown by Google when you search for "public key" or "private key"?
 
Learn If you want to write code for Python Machine learning, AI Statistics/data analysis Scientific research Web application servers Some microcontrollers JavaScript/Node JS/TypeScript Web sites Web application servers C# Games (Unity) Consumer applications (Windows) Business applications C++ Games (Unreal Engine) Operating systems, device drivers Microcontrollers/embedded systems Consumer applications (Linux) Some more tips: Do not learn C++ (or any other dialect of C) as a...

Similar threads

  • · Replies 17 ·
Replies
17
Views
557
Replies
17
Views
623
  • · Replies 14 ·
Replies
14
Views
2K
  • · Replies 8 ·
Replies
8
Views
2K
  • · Replies 11 ·
Replies
11
Views
2K
  • · Replies 1 ·
Replies
1
Views
3K
Replies
1
Views
1K
  • · Replies 1 ·
Replies
1
Views
2K
  • · Replies 1 ·
Replies
1
Views
1K
Replies
4
Views
3K