Wednesday, October 8, 2014

Chapter 7: Cryptography - Public Key Infrastructure

I have found a website that explains PKI in a way that I understand a little better than the way the book puts it. Here is the link.


Also, here is a diagram from the website that is helpful in describing whose key to use and what type of key to use.

To do thisUse whoseKind of key
Send an encrypted messageUse the receiver'sPublic key
Send an encrypted signatureUse the sender'sPrivate key
Decrypt an encrypted messageUse the receiver'sPrivate key
Decrypt an encrypted signature (and authenticate the sender)Use the sender'sPublic key

Below is another diagram that shows how PKI works in digital communication from http://www.asu.edu/ecure/2002/dollar/



No comments:

Post a Comment