Timeline for "Inverted" asymmetric encryption
Current License: CC BY-SA 3.0
7 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Dec 5, 2014 at 17:47 | vote | accept | CommunityBot | ||
| Dec 5, 2014 at 9:33 | comment | added | drpexe | Just be careful because, at least with SSH keys, you can easily find the public key if you have the private. Not sure if this is true for all asymmetric encryption. | |
| Dec 5, 2014 at 7:37 | comment | added | user61429 | @cpast It can be a problem, thanks for the advice. | |
| Dec 5, 2014 at 6:25 | history | edited | Lucas NN | CC BY-SA 3.0 | added 1 character in body |
| Dec 5, 2014 at 4:57 | comment | added | cpast | I think that in at least some asymmetric cryptosystems, it's simple to create the public key from the private key (even when that need not be the case, like in textbook RSA, an implementation might attach the public key to the private key because the public key need not be secret). Don't rely on the ability to keep the public key secret if the private key is exposed; that's one reason to use digital signatures (others include that they're analyzed for security in this context, and you won't have to implement them yourself). | |
| Dec 5, 2014 at 3:56 | vote | accept | CommunityBot | ||
| Dec 5, 2014 at 4:00 | |||||
| Dec 5, 2014 at 2:03 | history | answered | Lucas NN | CC BY-SA 3.0 |