What are secret keys?

We have seen that public-key encryption is slow compared to symmetric-key encryption and that public-key encryption is useful for distributing a key between two parties which can then be used for symmetric encryption.

The exact workings for this are as follows:

  1. Each side generates half of the key
  2. They encrypt the half they generated with the other persons public key
  3. Each side then sends their half to the other
  4. As they receive the other half they decrypt with their private key so both parties now have both parts of the key and can now use symmetric-key encryption

While it would be possible for one side to generate the whole key this doubles the security as even if someone knew one parties private key they would only have half the key.

1st Security Agent

Mail Bomber

Security Administrator

PC Lockup

Access Lock

Access Administrator Pro

ABC Security Protector

1st Security Agent

Mail Bomber

Security Administrator for Windows

PC Lockup

Access Lock

Access Administrator

ABC Security Protector

http//www.softheap.com