Psoasman wrote: » Hope that helps. What books are you reading?
dynamik wrote: » Wikipedia does a decent job of explaining this:Public-key cryptography - Wikipedia, the free encyclopediaPublic key infrastructure - Wikipedia, the free encyclopedia
Psoasman wrote: » Think of it this way: If Tom wants to send Susan a message and make sure its stays private, he will encrypt the message with HER public key. Susan will then use HER private key ( which only she possesses) and uses it to decrypt the message. Susan can give her public to anybody who needs to send her a message. If nosy frank intecepts the message from Tom to Susan, he can't decrypt it, it will be gibberish to him. Public key= available to anybody Private key = kept secret. They are like a matched set. one locks, the other unlocks. Hope that helps. What books are you reading?