From the course: Cryptography: Technologies for Securing Data and Communications
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
How key-based encryption works
From the course: Cryptography: Technologies for Securing Data and Communications
How key-based encryption works
(bright music) - Hi, everyone. I'm Dr. Ken Ehrhardt. I'm a fellow at the Krach Institute for Tech Diplomacy. Now let's talk a minute about public key encryption. It's the key you give to people, called your public key, and the key you don't give to people, called your private key. You pick your private key first, which is usually a phrase, a mixture of special characters, letters, numbers, and from that is generated the public key you give to people. Public key is your padlock. The private key is your single key to unlock it. Now, if you want to send a reply back to the person who sent you the message, you want to get their public key, you would compose your reply, put it in the box, use their public key to lock the box, and send it back. They would then have a private key that you have no knowledge of, and they would unlock the box and pick up your reply and read it. So if two parties want to exchange information privately using PKE, you each have to send the other your public key…