![]() |
Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
Dan Ritter wrote: > The properties of the classic public key systems are as > follows: > > Take a message and encrypt it with your private key: Now anyone > can decrypt it with your public key and assure themselves it > came from you, or at least someone with your private key. > > Take a message and encrypt it with Bob's public key: Now only > Bob's private key can decrypt it. > > Take a message, encrypt it with your private key (signing) and > then Bob's public key. Now only Bob's private key can decrypt > it, and then he has to decrypt it with your public key, showing > that the message was from you to him. >