Can someone explain this to me?

For system help, all hardware / software topics NOTE: use Coders Corner for all coders topics.

Moderators: Krom, Grendel

Post Reply
User avatar
Capm
DBB DemiGod
DBB DemiGod
Posts: 2267
Joined: Thu Nov 05, 1998 12:01 pm
Location: Topeka, KS
Contact:

Can someone explain this to me?

Post by Capm »

OpenPGP.

I noticed my host has added a spot for this on my control panel, it generates a public and private key.

Err, I know PGP is for encrypting things, but how exactly does this work? It makes a key, now what?
--------------
----------
---Capm
http://www.midnightsquadron.com
User avatar
EngDrewman
DBB Ace
DBB Ace
Posts: 232
Joined: Mon Oct 13, 2008 12:01 am
Location: Sacramento, CA
Contact:

Post by EngDrewman »

User avatar
Capm
DBB DemiGod
DBB DemiGod
Posts: 2267
Joined: Thu Nov 05, 1998 12:01 pm
Location: Topeka, KS
Contact:

Post by Capm »

I've been there, it doesn't really help. What I'm looking for here is practical application.
--------------
----------
---Capm
http://www.midnightsquadron.com
User avatar
TechPro
DBB Admiral
DBB Admiral
Posts: 1520
Joined: Thu May 20, 2004 11:51 pm

Post by TechPro »

The Wikipedia page for PGP (here) seems pretty helpful to me, along with a Google search ... but I suspect you already knew about those. :wink: Guess that probably doesn't help you much. Wish I could help you more.
User avatar
Jeff250
DBB Master
DBB Master
Posts: 6539
Joined: Sun Sep 05, 1999 2:01 am
Location: ❄️❄️❄️

Post by Jeff250 »

PGP is an implementation of asymmetric cryptography, i.e. the key you use to encrypt is different from the key you use to decrypt. In particular, it is an implementation of public key cryptography, where key pairs consist of a public key and a private key and have two special mathematical properties: (1) a message encrypted by a public key can only be decrypted by the corresponding private key, and (2) a message encrypted by a private key can only be decrypted by the corresponding public key. Using these special properties, we can use public key cryptography for both encryption and signing.

For encryption, we take advantage of property #1. You hand out the public key to anyone you want, and then they can use the public key to encrypt messages to you. You don't hand out the private key to anyone, since this is what you need to actually be able to decrypt the encrypted messages. Since only the private key, not the public key, will be able to decrypt these messages, it is safe to make the public key public.

For signatures, to ensure that a message that claims to be from you really is from you and hasn't been altered, we take advantage of property #2. In other words, the roles of the public key and private key are reversed. First, you hash the message. Then you encrypt the hash using your private key. Recipients can then use your well-known public key to decrypt the hash and ensure that the decrypted hash is the hash of the message. Since you are the only one with the private key, you are the only one who can encrypt the hash such that the public key you handed out to everyone will be able to decrypt it, thus guaranteeing the message was from you.

That's at least how the technology works. I don't know how useful this is, since I don't actually know what your host means by offering this as a feature. ;)
Post Reply