KEYS - Public and Private


We saw in the last two sessions it possible to send a 
message safely, but can we be sure that the person who
is sending the message is the true sender. What if a hacker
was pretending to be the sender and they were giving me
false information. how could I tell how how how well this is a Hacker




Another way to stop them is to use a





By using your Private key to encrypt your Public key you

create a coded message that can only be de-coded using

your Public key, and when you de-code it, it contain your

Public key.  

Because only you have your Private key, then only you could 

have created the message, therefore it must have come from 

you.      


                        It is your DIGITAL SIGNATURE.







^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Scroll back

READ THE SENTENCE ABOVE OVER ABOUT 3 TIMES

         THINK ABOUT IT     

KEEP READING IT OVER and OVER UNTIL YOU 

           UNDERSTAND IT AND IT MAKES SENSE

then continue

-------------------------------------------------------------------------------------






These signatures can be stored at special sites, and documents

 can be sent to these sites to get a Certificate of Authenticity.

Sometimes called digital certificates.

Now ,  on to revision

Revise session 3                    Test for session 3                    Return to the main page
1