Search IT Knowledge Exchange
Join / Login
IT Knowledge Exchange
a TechTarget Expert Community
Questions & Answers
Discussions
Blogs
Tags
Welcome to TechTarget's expert community for technology professionals.
Get Access
Questions & Answers
?
Ask a question, help others, and get answers from the community
Discussions
Start a thread and discuss today's topics with top experts
Blogs
Read the latest tech blogs written by experienced community members
https://itknowledgeexchange.techtarget.com/itanswers/please-help-me-in-security#question_answer
Please help me in security
dhaval2792
35 pts.
Tags:
Thanks! We'll email you
when relevant content is
added and updated.
Following
Follow
Security
I have question about public key and private key. If one user sends a message to b, encrypted by public key of b, then how can user b decrypt it using its private key? I mean the public and private key are not different?
Asked:
May 4, 2013 3:31 PM
Last updated:
May 6, 2013 3:31 PM
Related Questions
Questions about symmetric session keys in SSL/TLS
Access to iSeries IFS using SCP
How to calculate private keys
Finding the public key in an asymmetric encryption on SQL Server
Further enhancing public-private key encryption/decryption
0
Answer Wiki
Thanks. We'll let you know when a new response is added.
Please enter an answer.
Send me notifications when members answer or reply to this question.
Register Here
or
login
if you are already a member
E-mail
User Name
Password
Forgot Password?
I agree to TechTarget's
Terms of Use
,
Privacy Policy
, and the transfer of my information to the United States for processing to provide me with relevant information as described in our Privacy Policy.
I agree to my information being processed by TechTarget and its
Partners
to contact me via phone, email, or other means regarding information relevant to my professional interests. I may unsubscribe at any time.
Answer
Answer
Processing your response...
Discuss This Question:
1
 
Reply
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Please enter a reply.
Send me notifications when members answer or reply to this question.
Register Here
or
login
if you are already a member
E-mail
User Name
Password
Forgot Password?
I agree to TechTarget's
Terms of Use
,
Privacy Policy
, and the transfer of my information to the United States for processing to provide me with relevant information as described in our Privacy Policy.
I agree to my information being processed by TechTarget and its
Partners
to contact me via phone, email, or other means regarding information relevant to my professional interests. I may unsubscribe at any time.
Reply
Processing your reply...
Sort by:
Oldest
Newest
Sorting replies...
TomLiotta
May 4, 2013 10:59 PM GMT
The public and private keys are very different. That is part of why the process is so useful. -- Tom
125,585 points
Badges:
report
Next
View All Replies
ADD YOUR REPLY
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.
Register Here
or
login
if you are already a member
E-mail
User Name
Password
Forgot Password?
I agree to TechTarget's
Terms of Use
,
Privacy Policy
, and the transfer of my information to the United States for processing to provide me with relevant information as described in our Privacy Policy.
I agree to my information being processed by TechTarget and its
Partners
to contact me via phone, email, or other means regarding information relevant to my professional interests. I may unsubscribe at any time.
Reply
Processing your reply...
Ask a Question
Question Title:
(150 char. limit.)
Question:
(Please be specific.)
Tags:
(Separate with commas.)
What is a Tag?
Ask Question
Featured Questions
CLIENT MAC ADDR 00 16 35 66… GUID: 0EF0C… error on startup
Asked by: Frajan
Compiling CL Program
Asked by: GHENDER
Integer value using physical file in iSeries
Asked by: hbrooks
Forgot Password
No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.
E-mail:
Submit
Your password has been sent to:
cguarrera@techtarget.com
To follow this tag...
There was an error processing your information. Please try again later.
Register Here
or
login
if you are already a member
E-mail
User Name
Password
Forgot Password?
I agree to TechTarget's
Terms of Use
,
Privacy Policy
, and the transfer of my information to the United States for processing to provide me with relevant information as described in our Privacy Policy.
I agree to my information being processed by TechTarget and its
Partners
to contact me via phone, email, or other means regarding information relevant to my professional interests. I may unsubscribe at any time.
Follow
Thanks! We'll email you when relevant content is added and updated.
Following
Share this item with your network:
Discuss This Question: 1  Reply