There’s a server, a client, and a hacker in a network. For encryption, the client and the server need to share their private keys. Wouldn’t the hacker be able to grab those during their transmission and decrypt further messages as they please?

You are viewing a single thread.
View all comments View context
2 points

If you know the private key it is trivial to calculate the public key, but the reverse isn’t true

I didn’t believe this is true… In public/private key crypto there is no such thing as “private” and “public”. They’re just a key pair. You choose to make one public by sharing it and the other private by not sharing it.

permalink
report
parent
reply
2 points

It depends on the cryptosystem. The private and public halves of the pair are often not symmetrical and often have overlap.

The parent is likely confused because in most situations the “private key file” will also contain all of the public key. Whether by necessity or for convenience.

permalink
report
parent
reply
1 point

Ok, semantics - for RSA you generate a private key, then derive the public key from that private key, and you could publicly post your private key if you wanted to. “Public” and “private” are just names.

permalink
report
parent
reply

Security

!security@lemmy.ml

Create post

Confidentiality Integrity Availability

Community stats

  • 55

    Monthly active users

  • 214

    Posts

  • 342

    Comments

Community moderators