Computer Science – Encryption | e-Consult
Encryption (1 questions)
Login to see all questions.
Click on a question to view the answer
Here's how Alice and Bob can use asymmetric encryption to exchange a secret message:
- Key Generation: Both Alice and Bob generate their own key pairs – a public key and a private key. Alice's public key is shared with everyone, while Bob's public key is also shared. Each keeps their private key secret.
- Alice's Encryption: Alice wants to send a secret message to Bob. She obtains Bob's public key. Alice then uses Bob's public key to encrypt the message. This creates ciphertext.
- Message Transmission: Alice sends the ciphertext to Bob.
- Bob's Decryption: Bob receives the ciphertext. Bob uses his private key to decrypt the ciphertext, recovering the original secret message.
Role of Keys:
- Bob's Public Key: Used by Alice to encrypt the message. Anyone can use Bob's public key to encrypt a message intended for Bob.
- Bob's Private Key: Used by Bob to decrypt the message encrypted with his public key. Only Bob can decrypt messages encrypted with his public key.