"The differential equations that describe dynamic interactions of power generators are similar to that of the gravitational interplay among celestial bodies, which is chaotic in nature."
"The differential equations that describe dynamic interactions of power generators are similar to that of the gravitational interplay among celestial bodies, which is chaotic in nature."
"The differential equations that describe dynamic interactions of power generators are similar to that of the gravitational interplay among celestial bodies, which is chaotic in nature."
Originally posted by Nicholas Jordan:
My question is: Given some Bob, how do you get the key to Bob ?
"The differential equations that describe dynamic interactions of power generators are similar to that of the gravitational interplay among celestial bodies, which is chaotic in nature."
Originally posted by Nicholas Jordan:
[PF:] ... send it anyway you like.
Allright, let's do some real work. Say the intended recipient is in hostile territory.[/QUOTE
I am not following you, and don't have time to look at the source code.
If you are using RSA crypto, in typical usage patterns, both sides generate key pairs and exchange the public sides and keep the private keys private forever.
They *publish* the public keys. They are public. They publish it anyway they like.
When they want to send any messages, say the proverbial "attack at dawn with details, whatever data, media, etc. is appropriate" the sender generates a random session key of 128 bit length, signs and enciphers the session key, sends the resulting cipher text of the session key over insecure channels. They then follow that with the message data enciphered with the session key using a symmetric cipher such as AES128.
The security depends only on the strength of the published algorithm, in this case AES128, and the session key.
The receiver uses their private key to decipher the first part of message (containing the session key) and uses the retrieved session key to decipher the message, media, etc.
All of this depends on assumptions that while the messages pass through unknown, uncontrolled, and untrusted channels, the end point computers are trusted.
If the receiving computer is not trusted, there is no point in using it to decipher any messages.
Grow a forest with seedballs and this tiny ad:
the value of filler advertising in 2021
https://coderanch.com/t/730886/filleradvertising
