This week's book giveaway is in the Servlets forum.
We're giving away four copies of Murach's Java Servlets and JSP and have Joel Murach on-line!
See this thread for details.
The moose likes Architect Certification (SCEA/OCMJEA) and the fly likes Asymmetric Cryptography Big Moose Saloon
  Search | Java FAQ | Recent Topics | Flagged Topics | Hot Topics | Zero Replies
Register / Login


Win a copy of Murach's Java Servlets and JSP this week in the Servlets forum!
JavaRanch » Java Forums » Certification » Architect Certification (SCEA/OCMJEA)
Bookmark "Asymmetric Cryptography" Watch "Asymmetric Cryptography" New topic
Author

Asymmetric Cryptography

Prav Chau
Ranch Hand

Joined: Jul 17, 2007
Posts: 58
I am bit confused regarding the encryption and decryption thing here.

As we know Asymmetric Cryptography uses two keys (Public and Private), Which key is used for encryption and which one is used for decryption.

In some articles they mention that Public or Private keys can be used for encryption or decryption or vice versa..

Preety confusing.. Can anyone suggest?


Prav Chau
SCJP, SCWCD, SCBCD, SCEA, http://pravinchaudhari.blogspot.com/
Piotr Uryga
Ranch Hand

Joined: May 25, 2006
Posts: 68
If You want to ENCRYPT message:
In PKI You use Your private key to decrypt received message.
You also share Your public key and well... publicize it to allow other people to create messages which only You can read -message encrypted with You public key, can be decrypted only with Your private key (only You posses this key).

If You want to digitally SIGN message:
You use private key to sign a message - everybody can read it (using Your public key), but it is ensured that only message was sent by You.

More info here.
[ July 20, 2007: Message edited by: Piotr Uryga ]

SCJP 1.4, SCWCD 1.4, SCBCD 5, SCEA
Gabriel Claramunt
Ranch Hand

Joined: May 26, 2007
Posts: 375
Both keys are used for encryption and decryption.
In its basic form, works like this:
If A sends a message to B,
A encrypt the message with A's private key combined with B's public key
B decrypts the message with B's private key combined with A's public key


Gabriel
Software Surgeon
Kedar Bhawarthi
Greenhorn

Joined: May 14, 2004
Posts: 8
If we limit our discussion about Asymmetric Cryptography there are no public or private keys. It only says that there will be a unique combination of key as 'key A' and 'key B' with which
if you encrypt message with 'key A' you will be able to decrypt with 'key B'
and if you encrypt message with 'key B' you will be able to decrypt it with 'key A'


Now in real world when you apply this Asymmetric Cryptography in whatever ways *then* you say that, ok.. you designate one of the key as publicly shared and one as secrete/private; only then you will be able to mange secrecy.

So there should not be anything like - only private key can used to encrypt etc.
....make sense?
Prav Chau
Ranch Hand

Joined: Jul 17, 2007
Posts: 58
Preety Much..Thanks
 
I agree. Here's the link: http://aspose.com/file-tools
 
subject: Asymmetric Cryptography
 
Similar Threads
how to encrypt the text
Symmetric vs. asymmetric
Encryption Performance
New mock tests!
Browser and Server SSL communication