Skip to main content

Timeline for "Inverted" asymmetric encryption

Current License: CC BY-SA 3.0

7 events
when toggle format what by license comment
Dec 5, 2014 at 17:47 vote accept CommunityBot
Dec 5, 2014 at 9:33 comment added drpexe Just be careful because, at least with SSH keys, you can easily find the public key if you have the private. Not sure if this is true for all asymmetric encryption.
Dec 5, 2014 at 7:37 comment added user61429 @cpast It can be a problem, thanks for the advice.
Dec 5, 2014 at 6:25 history edited Lucas NN CC BY-SA 3.0
added 1 character in body
Dec 5, 2014 at 4:57 comment added cpast I think that in at least some asymmetric cryptosystems, it's simple to create the public key from the private key (even when that need not be the case, like in textbook RSA, an implementation might attach the public key to the private key because the public key need not be secret). Don't rely on the ability to keep the public key secret if the private key is exposed; that's one reason to use digital signatures (others include that they're analyzed for security in this context, and you won't have to implement them yourself).
Dec 5, 2014 at 3:56 vote accept CommunityBot
Dec 5, 2014 at 4:00
Dec 5, 2014 at 2:03 history answered Lucas NN CC BY-SA 3.0