Soldato
- Joined
- 30 Dec 2004
- Posts
- 4,681
- Location
- Bromley, Kent
Can somebody just check this to make sure I understand it correctly please:
Thanks guys
- Pea0n
PC-A has a public key and private key. It wants to communicate with encrypted data with PC-B. PC-A sends the Public key to PC-B. However PC-C is trying to gain access to the communication without authorisation and also steals the Public key. So PC-A, B and C all have the public Key.
PC-B transmits the data to PC-A, encrypted with the Public Key given from PC-A. As the public and private key are mathematically linked, PC-A uses its private key to decrypt the data sent from PC-B correctly. Now PC-C also intercepts the data sent from PC-B and so has the encrypted data as well as the public key.
However as the public key can ONLY be used to encrypt data and not decrypt it, PC-C cannot read the data.
The Private key is never broadcast and only used by the receiving PC (in this case PC-A). If PC-B then wanted to receive data from PC-A in return, it would broadcast its own unique public key to PC-A and uses its own, also unique, private key to decrypt the data sent from PC-A using PC-Bs' public key
Thanks guys

- Pea0n