This might not belong here but it is the most relevant place I think.
I have been discussing VPN's and how can they be utilized for secure data exchange over the internet. VPN's can support 256-bit AES encryption as most of you veterans know.
http://hardforum.com/showthread.php?t=1748457
I kept on reading about cryptography and discovered the public key cryptography(asymmetric) that is more secure compared to symmetric cryptography.
In symmetric cryptography, both sides come up with a key to encrypt/decrypt data and they both should have it, so they should agree on it in advanced without anybody knowing. In public key cryptography, you have two keys, one public and one private which must be kept private and be unknown to others. You encrypt data using the public key and the other side will decrypt using it the corresponding private key.
This is where my question come from. How can a key be able to decrypt data that were encrypted by a different key?? My reading tells me that the both keys are mathematically linked or related, and it is done in a way that it is nearly impossible to generate the private key from its corresponding public key.
Okay that's fine, but how does it really happen? I mean eventually the same exact key that encrypted data should decrypt it................isn't that right? Maybe when applying the private key and during the decryption process, the private key is converted to the public key using the mathematical relationship ?
I couldn't figure it out by further reading on the subject, hence this thread.
I appreciate all input and comments. Thaaaaaaaaaaaaaaaaaaanks.
I have been discussing VPN's and how can they be utilized for secure data exchange over the internet. VPN's can support 256-bit AES encryption as most of you veterans know.
http://hardforum.com/showthread.php?t=1748457
I kept on reading about cryptography and discovered the public key cryptography(asymmetric) that is more secure compared to symmetric cryptography.
In symmetric cryptography, both sides come up with a key to encrypt/decrypt data and they both should have it, so they should agree on it in advanced without anybody knowing. In public key cryptography, you have two keys, one public and one private which must be kept private and be unknown to others. You encrypt data using the public key and the other side will decrypt using it the corresponding private key.
This is where my question come from. How can a key be able to decrypt data that were encrypted by a different key?? My reading tells me that the both keys are mathematically linked or related, and it is done in a way that it is nearly impossible to generate the private key from its corresponding public key.
Okay that's fine, but how does it really happen? I mean eventually the same exact key that encrypted data should decrypt it................isn't that right? Maybe when applying the private key and during the decryption process, the private key is converted to the public key using the mathematical relationship ?
I couldn't figure it out by further reading on the subject, hence this thread.
I appreciate all input and comments. Thaaaaaaaaaaaaaaaaaaanks.