cloudy understanding of asymmetric cryptography
Sascha Kiefer
sk at intertivity.com
Thu Mar 26 11:12:24 CET 2009
Yes, that is right.
Asymmetric encryption is a slow process. Encrypting the whole message would
take forever.
So, symmetric keys a quite small, that's why the described technique is
used.
Cheers,
Sascha
-----Original Message-----
From: gnupg-users-bounces at gnupg.org [mailto:gnupg-users-bounces at gnupg.org]
On Behalf Of Felipe Alvarez
Sent: Donnerstag, 26. März 2009 13:51
To: gnupg-users
Subject: cloudy understanding of asymmetric cryptography
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Someone today shook my understanding of asymmetric ciphers.
_Bob performs symmetric encryption on message with_
_key "K" (generated randomly). He then encrypts "K" _
_with Alice's public key, and sends both the symetrically _
_encrypted message and asymmetrically encrypted key to Alice_
Is this what happens during most/some/all of public-key
communications? I had always thought that the message is encrypted
with public key, and decrypted with secret key. I was not aware that
key "K" was encrypted with public key, but message encrypted with
__symmetric_cipher__.
To help my understanding a little futher, if this does not always
occur, or does not usually occur, when does it occur (not occur)?
Using what ciphers (algorithms)?
I was unable to find adequate explanations online.
Thanks
Felipe
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)
iEYEARECAAYFAknLT9sACgkQbm5xe/LPYKKywwCfZoz8b5XOW4EoSy+m6r/xIgli
rtcAn3Lb3cwzLL036BjOO5259rNhWFW5
=b2iF
-----END PGP SIGNATURE-----
_______________________________________________
Gnupg-users mailing list
Gnupg-users at gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
More information about the Gnupg-users
mailing list