What are secret keys?

John Savill

April 6, 2000

1 Min Read
ITPro Today logo in a gray background | ITPro Today

A. We have seen that public-key encryption is slow compared tosymmetric-key encryption and that public-key encryption is useful fordistributing a key between two parties which can then be used for symmetricencryption.

The exact workings for this are as follows:

  1. Each side generates half of the key

  2. They encrypt the half they generated with the other persons public key

  3. Each side then sends their half to the other

  4. As they receive the other half they decrypt with their private key so both parties now have both parts of the key and can now use symmetric-key encryption

While it would be possible for one side to generate the whole key thisdoubles the security as even if someone knew one parties private key they wouldonly have half the key.

About the Author

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like