123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

How Public Key Encryption Works

Profile Picture
By Author: Tammy Zhou
Total Articles: 3764
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

When you are entering your credit card number, talking with your lover, chatting with your business partners, can you imagine what will happen if everything you are doing is exposing to everybody?

Yes, it is unbelievable but it is quite true, hackers can easily obtain your private information like credit card number, email logs, chat logs etc. by using some network analytic tools, such as Colasoft packet sniffers.

Protect Your Email Secure And Safe So if we are helpless with our private information from being monitored or stolen? Of course not, to keep data sent via email private, you just need to encrypt it, as only unencrypted content can be monitored by network analytic tools like packet sniffer. Only the targeted recipient will be able to decipher the message.

How to Encrypt Your Message? Public key encryption is a special case of encryption, it operates using a combination of two keys: one is a private key, the other is a public key which together form a pair of keys. The private key is kept secret on your computer since it is used for decryption, the public key, which is used for encryption, is given ...
... to anybody who wants to send encrypted mail to you.

How public key works? When you send public-key encrypted mail, the sender's encryption program uses your public key in combination with the sender's private key to encipher the message. When you receive public-key encrypted mail, you need to decipher it.colasoft packet sniffer Decryption of a message enciphered with a public key can only be done with the matching private key. This is why the two keys form a pair, and it is also why it is so important to keep the private key safe and to make sure it never gets into the wrong hands (or in any hands other than yours).

Why the Integrity of the Public Key is Essential Another crucial point with public key encryption is the distribution of the public key. Public key encryption is only safe and secure if the sender of an enciphered message can be sure that the public key used for encryption belongs to the recipient. A third party can produce a public key with the recipient's name and give it to the sender, who uses the key to send important information in encrypted form. The enciphered message is intercepted by the third party, and since it was produced using their public key they have no problem deciphering it with their private key. This is why it is mandatory that a public key is either given to you personally or authorized by a certificate authority.

Total Views: 180Word Count: 432See All articles From Author

Add Comment

Computers Articles

1. Black Friday Tech Deals: Lock In Your 2026 Ai Readiness With Exclusive Ecf Data Offers
Author: ECF Data

2. What Is Nova And How Does It Help Businesses?
Author: TrackHr App

3. Edge Development Platform Market: Powering Next-generation Distributed Applications
Author: Umangp

4. Enterprise Mobile App DevelopmentĀ 
Author: brainbell1021

5. E-commerce Web Development
Author: brainbell1021

6. Dynamics 365 Supply Chain Management T
Author: brainbell1021

7. Modern Software At Scale: A Practical Guide To Microservice Development
Author: Tech Gazebos

8. The Financial Cost Of Ignoring Computer Repairs: A Westlake Case Study
Author: Arun Singh

9. Cloud Computing Companies In India | Cloud Hosting Service Providers In India | Sathya Technosoft
Author: Sathya Technosoft

10. Embedded Systems Advantages And Disadvantages
Author: Embeddedhash

11. Why Essae Pos Machines Are Ideal For Retail Growth
Author: pbs

12. Best Wordpress Development Companies In India For Business Growth
Author: Web Panel Solutions

13. How Enterprises Leverage It Consulting Companies In The Usa For Cybersecurity
Author: Abiel

14. Cash Drawer Security Tips For Retailers | Prime Poskart
Author: prime poskart

15. Successful Vb6 Migration And Upgrade
Author: Tech Gazebos

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: