The Untold Story of the Man That Made Mainstream Encryption Possible

Forums Security News (Security) The Untold Story of the Man That Made Mainstream Encryption Possible

  • This topic is empty.
Viewing 0 reply threads
  • Author
    Posts
    • #41458
      Telegram SmartBoT
      Moderator
      • Topic 5959
      • Replies 0
      • posts 5959
        @tgsmartbot

        #News(Security) [ via IoTGroup ]


        Headings…
        The Untold Story of the Man That Made Mainstream Encryption Possible
        Meet Whit Diffie, the man who invented public key cryptography and brought

        Auto extracted Text……

        First, by presenting an alternative to systems that worked with a single, symmetrical key, Diffie had solved a problem that had become so embedded in cryptographic systems that it had occurred to almost no one that it could be solved: the difficulty of distributing those secret keys to future recipients of secret messages.
        But it has to be Bob’s personal public key, a very long string of bits that could only have been gener­ated by only one person in the world… Bob. Then, by way of a one­-way function, she uses that public key to scramble the message in such a way that only the private key—the other half of that unique key pair—performs the decrypting calculation.
        (Thus the secret key is the “trapdoor” in the trapdoor one-way function Diffie was thinking about.)
        He possesses the secret part of the key pair, and he can use that private key to decipher the message in a jiffy.
        When it comes to encrypted messages, the only value of having Bob’s public key is to, in effect, change the message to Bob-speak, the language that only Bob can read (by virtue of having the secret half of the key pair).
        If the result was plaintext and not gibberish, you’d know for certain that it was Einstein’s message—because he holds the world’s only private key that could produce a message that his matching public key could unscramble.
        In other words, applying one’s secret key to a message is equivalent to signing your name: a digital signature.
        If the message was digitally signed with a private key but unencrypted, such a rogue could intercept it, use the sender’s well-distributed public key to descramble it, and then make the change in the plaintext.
        If Mark wanted to send an order to his banker, Lenore, he’d first sign the request with his private key, then encrypt that signed message with Lenore’s public key


        Read More..
        AutoTextExtraction by Working BoT using SmartNews 1.02976805238 Build 26 Aug 2019

    Viewing 0 reply threads
    • You must be logged in to reply to this topic.