O'Reilly logo

Simple Steps to Data Encryption by Peter Loshin

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3

Public Keys

Bob’s eyes fluttered shut reading Sam’s howto, but he twitches into awareness when Sam’s wristwatch emits a tiny beep, just 20 minutes into their flight.

“OK sleepyhead, are you ready for more GnuPG?” Sam asks.

Bob, brushing sleep from his eyes, answers, “Sure. Can you explain how to do public key encryption now?”

Sam answers: “Public key encryption is the real thing. Strong cryptography scared the US government back in the 1990s because it’s so strong. With my public key, you can encrypt a message to me and as long as I can keep my private key safe, I am the only person in the world who can decrypt that message.”

Bob asks, “But why is that so scary?”

Sam, leaning forward, says, “That first thing I showed you, how to encrypt ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required