DaveC426913
Gold Member
- 23,862
- 7,903
- TL;DR Summary
- I mean, sure, it only uses a key that has 365 combinations...
I've tried to intuit public key encryption but never quite managed.
But this seems to wrap it up in a bow.
This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher.
Is this how PKE works?
No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.
But this seems to wrap it up in a bow.
This seems to be a very elegant way of transmitting a message publicly that only the sender and receiver can decipher.
Is this how PKE works?
No, it cant be. In the above case, the requester knows the target's "secret" key - because they have his ID, and therefore knows his birthdate.