• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Devaka Cooray
  • Knute Snortum
  • Paul Clapham
  • Tim Cooke
Sheriffs:
  • Liutauras Vilda
  • Jeanne Boyarsky
  • Bear Bibeault
Saloon Keepers:
  • Tim Moores
  • Stephan van Hulst
  • Ron McLeod
  • Piet Souris
  • Frits Walraven
Bartenders:
  • Ganesh Patekar
  • Tim Holloway
  • salvin francis

XKMS question from Mikalai's note  RSS feed

 
Greenhorn
Posts: 20
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Hi,

I was going through XKMS content from Mikalai's online study guide.(http://java.boot.by/scdjws5-guide/ch08s02.html) I came across this statement.

PKI refers to a set of security services for authentication, encryption and digital certificate management under which documents are encrypted with a private key and decrypted using a publicly available key accessible to the recipient via a network.


Shouldn't it be reverse like "...encrypted with a public key and decrypted using private key..."?

Thanks
 
Ranch Hand
Posts: 2198
1
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Hi!
As far as I understand, you can encrypt data using either the public or private key, as long as you use the other, that is the private or public key, to decrypt the data.
The most common case is encryption using the public key, which is freely distributed. The encrypted data can then only be decrypted by the party that holds the private key, which is supposed to be a well-kept secret.
With signing of data only one party is supposed to be able to produce a signature of some data while anyone is supposed to verify from where the signature came. Thus, the private key is used to sign the data and the public key can then be used to verify the signature.
Best wishes!
 
Mark Heron
Greenhorn
Posts: 20
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator

Thanks Ivan for your explanation !!
 
Ranch Hand
Posts: 1183
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Public-key cryptography describes what Ivan just said -

The two main branches of public key cryptography are:

Public key encryption: ...

Digital signatures: a message signed with a sender's private key can be verified by anyone who has access to the sender's public key, thereby proving that the sender had access to the private key (and therefore is likely to be the person associated with the public key used), and the part of the message that has not been tampered with. On the question of authenticity, see also message digest.



Regards,
Dan
 
You can thank my dental hygienist for my untimely aliveness. So tiny:
how do I do my own kindle-like thing - without amazon
https://coderanch.com/t/711421/engineering/kindle-amazon
  • Post Reply Bookmark Topic Watch Topic
  • New Topic
Boost this thread!