Comments (1)
  • Add a Comment
  • Edit
  • More Actions v
  • Quarantine this Entry

1 Holgervk commented Permalink

Just 2 thoughts: <br /> &gt;The secret sauce of PK is that it uses two separate keys—one public and one private—so that messages encrypted by one key can only be decrypted by the other, and vice versa. <br /> There is no vice versa. <br /> Messages encrypted with the public key can only be decrypted with the according private key. You cannot decrypt anything with a public key. <div>&nbsp;</div> &gt;RSA is slower at decrypting, so on older servers you might choose RSA to reduce server workload if the primary task is to encrypt files for transmission. <br /> This does not make sense. RSA/DSA (say, public key cryptography) is way to slow to encrypt files. In ssh its only used to transmit a so called session key (which is "fast symmetric encryption key", f.e. 3des, blowfish etc.). <br /> After transmitting this secret session key no pubkey-cryptographie is used anymore (well, besides user authentication but here is very few to encrypt/decrypt). <div>&nbsp;</div> Regs, Holger <br /> (a big fan of your ezh stuff ;-)