PGP...

Dave Crocker dcrocker at brandenburg.com
Wed Aug 14 10:40:24 PDT 1996


Responses you've gotten have foccussed on defining public versus private
key.  Some have cited how they are used, but I'd like to emphasize this:

Message authentication:

  Make a "hash" of the message, i.e., compute a short, unique tag of the
message.  (A common algorithm for this is MD5.)  Then "encrypt" the hash
using the SENDER's private key.  Anyone wishing to authenticate the message
uses the SENDER's public key to "decrypt" the hash and check it against the
message receive (i.e., recompute a new hash and compare it to the received
one.)


Message privacy:

  Encrypt the message data.  (A common algorithm is DES or, more recently,
triple DES.  PGP uses IDEA.)  To get acceptable performance, encryption is
done using a symmetric key algorithm, rather than a much slower asymmetric
(public) key algorithm.  Then "encrypt" the symmetric key using the
RECEIVER's public key.  The RECEIVER uses their private key to decrypt the
symmetric key and then uses the symmetric key to decrypt the data.


	Note that these two different functions use private keys in an
essential opposite manner, or reverse relationship.

d/


--------------------
Dave Crocker                                            +1 408 246 8253
Brandenburg Consulting                             fax: +1 408 249 6205
675 Spruce Dr.                                 dcrocker at brandenburg.com
Sunnyvale CA 94086 USA                       http://www.brandenburg.com

Internet Mail Consortium               http://www.imc.org, info at imc.org








More information about the cypherpunks-legacy mailing list