|
KEYS - Public and Private
We saw in the last two sessions it possible to send a
message safely, but can we be sure that the person who
is sending the message is the true sender. What if a hacker
was pretending to be the sender and they were giving me
false information.
how could I tell
how
how
how
well this is a Hacker

Another way to stop them is to use a

By using your Private key to encrypt your Public key you
create a coded message that can only be de-coded using
your Public key, and when you de-code it, it contain your
Public key.
Because only you have your Private key, then only you could
have created the message, therefore it must have come from
you.
It is your DIGITAL SIGNATURE.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Scroll back
READ THE SENTENCE ABOVE OVER ABOUT 3 TIMES
THINK ABOUT IT
KEEP READING IT OVER and OVER UNTIL YOU
UNDERSTAND IT AND IT MAKES SENSE
then continue
-------------------------------------------------------------------------------------
These signatures can be stored at special sites, and documents
can be sent to these sites to get a Certificate of Authenticity.
Sometimes called digital certificates.
Now , on to revision
Revise session 3
                  
Test for session 3
                  
Return to the main page
|