<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:series="https://publishpress.com/"
	
	>
<channel>
	<title>
	Comments on: Using Asymmetric Keys	</title>
	<atom:link href="https://www.practicalnetworking.net/series/cryptography/using-asymmetric-keys/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.practicalnetworking.net/series/cryptography/using-asymmetric-keys/</link>
	<description>Networking presented simply, practically, and applicably</description>
	<lastBuildDate>Fri, 14 Oct 2022 23:56:46 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>
		By: Ed Harmoush		</title>
		<link>https://www.practicalnetworking.net/series/cryptography/using-asymmetric-keys/#comment-254117</link>

		<dc:creator><![CDATA[Ed Harmoush]]></dc:creator>
		<pubDate>Fri, 14 Oct 2022 23:56:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.practicalnetworking.net/?p=221#comment-254117</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.practicalnetworking.net/series/cryptography/using-asymmetric-keys/#comment-254074&quot;&gt;cassie&lt;/a&gt;.

She can&#039;t, because she doesn&#039;t have Bob&#039;s Private Key.  You might be thinking of Signatures though, which is a different process. Details here:  https://www.youtube.com/watch?v=_zyKvPvh808]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.practicalnetworking.net/series/cryptography/using-asymmetric-keys/#comment-254074">cassie</a>.</p>
<p>She can&#8217;t, because she doesn&#8217;t have Bob&#8217;s Private Key.  You might be thinking of Signatures though, which is a different process. Details here:  <a href="https://www.youtube.com/watch?v=_zyKvPvh808" rel="nofollow ugc">https://www.youtube.com/watch?v=_zyKvPvh808</a></p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: cassie		</title>
		<link>https://www.practicalnetworking.net/series/cryptography/using-asymmetric-keys/#comment-254074</link>

		<dc:creator><![CDATA[cassie]]></dc:creator>
		<pubDate>Thu, 14 Jul 2022 12:52:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.practicalnetworking.net/?p=221#comment-254074</guid>

					<description><![CDATA[If Alice receives a message from Bob, which is encrypted using Bob’s public key. How is Alice going to decrypt that message?&#160;]]></description>
			<content:encoded><![CDATA[<p>If Alice receives a message from Bob, which is encrypted using Bob’s public key. How is Alice going to decrypt that message?&nbsp;</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Ed Harmoush		</title>
		<link>https://www.practicalnetworking.net/series/cryptography/using-asymmetric-keys/#comment-252609</link>

		<dc:creator><![CDATA[Ed Harmoush]]></dc:creator>
		<pubDate>Thu, 26 Aug 2021 23:43:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.practicalnetworking.net/?p=221#comment-252609</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.practicalnetworking.net/series/cryptography/using-asymmetric-keys/#comment-252541&quot;&gt;Emily&lt;/a&gt;.

Web browser sends the Public Key in the form of a &lt;em&gt;Certificate&lt;/em&gt;. The Certificate is signed by the CA. The web browser already has the CA&#039;s Public Key (this in fact is what is meant when we say the Web Browser already trusts the CA). 

The browser then uses the CA&#039;s Public Key to verify the CA Signature on the Certificate. If this succeeds, this links an Asymmetric Key Pair to the Certificate&#039;s Subject (the Web Server).

If that doesn&#039;t make sense, I&#039;d suggest subscribing to my youtube channel. In a few weeks I&#039;m going to release more Cryptography videos regarding TLS and SSL which will explain all this. They are sample videos from my full TLS course: 

https://classes.pracnet.net/courses/practical-tls]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.practicalnetworking.net/series/cryptography/using-asymmetric-keys/#comment-252541">Emily</a>.</p>
<p>Web browser sends the Public Key in the form of a <em>Certificate</em>. The Certificate is signed by the CA. The web browser already has the CA&#8217;s Public Key (this in fact is what is meant when we say the Web Browser already trusts the CA). </p>
<p>The browser then uses the CA&#8217;s Public Key to verify the CA Signature on the Certificate. If this succeeds, this links an Asymmetric Key Pair to the Certificate&#8217;s Subject (the Web Server).</p>
<p>If that doesn&#8217;t make sense, I&#8217;d suggest subscribing to my youtube channel. In a few weeks I&#8217;m going to release more Cryptography videos regarding TLS and SSL which will explain all this. They are sample videos from my full TLS course: </p>
<p><a href="https://classes.pracnet.net/courses/practical-tls" rel="nofollow ugc">https://classes.pracnet.net/courses/practical-tls</a></p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Emily		</title>
		<link>https://www.practicalnetworking.net/series/cryptography/using-asymmetric-keys/#comment-252541</link>

		<dc:creator><![CDATA[Emily]]></dc:creator>
		<pubDate>Wed, 25 Aug 2021 06:29:24 +0000</pubDate>
		<guid isPermaLink="false">http://www.practicalnetworking.net/?p=221#comment-252541</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.practicalnetworking.net/series/cryptography/using-asymmetric-keys/#comment-174556&quot;&gt;Ed Harmoush&lt;/a&gt;.

Hi Ed Sir,
Web server will send its own public key signed by a 3rd part&#039;s private key in a form of CA to your browser. Your browser will decrypt the CA with 3rd part&#039;s public key. If succeeds, it proves the public key is true from web server. Is it in the real world?

Thanks
Emily]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.practicalnetworking.net/series/cryptography/using-asymmetric-keys/#comment-174556">Ed Harmoush</a>.</p>
<p>Hi Ed Sir,<br />
Web server will send its own public key signed by a 3rd part&#8217;s private key in a form of CA to your browser. Your browser will decrypt the CA with 3rd part&#8217;s public key. If succeeds, it proves the public key is true from web server. Is it in the real world?</p>
<p>Thanks<br />
Emily</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Ed Harmoush		</title>
		<link>https://www.practicalnetworking.net/series/cryptography/using-asymmetric-keys/#comment-174556</link>

		<dc:creator><![CDATA[Ed Harmoush]]></dc:creator>
		<pubDate>Thu, 09 Jul 2020 15:13:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.practicalnetworking.net/?p=221#comment-174556</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.practicalnetworking.net/series/cryptography/using-asymmetric-keys/#comment-173385&quot;&gt;Muhamamd Zubair&lt;/a&gt;.

The keys exist within a key pair. Sharing one set across multiple people would defeat the primary benefit  an asymmetric key pair -- the fact that you never have to share the key. If you have to share the key and you can do so securely, then Symmetric encryption will provide more security (per bit of key size) and faster speeds.

So yes, a key pair must be owned by a single entity. 

Now, if Alice has a public and private key, Bob can use Alice&#039;s public key to securely exchange a symmetric key. So it absolutely is possible for there to be only a single party with a Public/Private Key and for secure communication to exist. Notice in the &quot;Real World Usage&quot; section, Bob&#039;s public and private key are never used, only Alice&#039;s. In fact, this is what happens with TLS/SSL when you browse to a website, your browser doesn&#039;t have a public/private key, but the web server does.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.practicalnetworking.net/series/cryptography/using-asymmetric-keys/#comment-173385">Muhamamd Zubair</a>.</p>
<p>The keys exist within a key pair. Sharing one set across multiple people would defeat the primary benefit  an asymmetric key pair &#8212; the fact that you never have to share the key. If you have to share the key and you can do so securely, then Symmetric encryption will provide more security (per bit of key size) and faster speeds.</p>
<p>So yes, a key pair must be owned by a single entity. </p>
<p>Now, if Alice has a public and private key, Bob can use Alice&#8217;s public key to securely exchange a symmetric key. So it absolutely is possible for there to be only a single party with a Public/Private Key and for secure communication to exist. Notice in the &#8220;Real World Usage&#8221; section, Bob&#8217;s public and private key are never used, only Alice&#8217;s. In fact, this is what happens with TLS/SSL when you browse to a website, your browser doesn&#8217;t have a public/private key, but the web server does.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Muhamamd Zubair		</title>
		<link>https://www.practicalnetworking.net/series/cryptography/using-asymmetric-keys/#comment-173385</link>

		<dc:creator><![CDATA[Muhamamd Zubair]]></dc:creator>
		<pubDate>Sun, 05 Jul 2020 15:41:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.practicalnetworking.net/?p=221#comment-173385</guid>

					<description><![CDATA[Thank you for the explanation. 
In Asymmetric, both entities must have own private and public key?
Or Bob having private and secret but Alias has only one key (Private or Public) 
Just want to know, Can Public key encrypt and decrypt data?]]></description>
			<content:encoded><![CDATA[<p>Thank you for the explanation.<br />
In Asymmetric, both entities must have own private and public key?<br />
Or Bob having private and secret but Alias has only one key (Private or Public)<br />
Just want to know, Can Public key encrypt and decrypt data?</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Ed Harmoush		</title>
		<link>https://www.practicalnetworking.net/series/cryptography/using-asymmetric-keys/#comment-170831</link>

		<dc:creator><![CDATA[Ed Harmoush]]></dc:creator>
		<pubDate>Fri, 26 Jun 2020 20:16:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.practicalnetworking.net/?p=221#comment-170831</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.practicalnetworking.net/series/cryptography/using-asymmetric-keys/#comment-167116&quot;&gt;M L&lt;/a&gt;.

Great question!

In most &quot;secure&quot; communication protocols, there is a step after the exchange of the keys which validates that the right person has the right keys. For instance, in TLS/SSL, the &quot;Finished&quot; message serves this purpose.

Essentially the way it works is, the &quot;Key Exchange&quot; process outlined above is combined with the &quot;Signatures&quot; process. In simple steps, Bob will encrypt the Symmetric Key with Alice&#039;s Public Key, then &quot;encrypt&quot; &lt;em&gt;that&lt;/em&gt; with his Private Key. This means anyone can verify it was definitley sent from Bob, but only Alice can extract the actual Symmetric Key.

Glad you enjoyed the series. Good questions!]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.practicalnetworking.net/series/cryptography/using-asymmetric-keys/#comment-167116">M L</a>.</p>
<p>Great question!</p>
<p>In most &#8220;secure&#8221; communication protocols, there is a step after the exchange of the keys which validates that the right person has the right keys. For instance, in TLS/SSL, the &#8220;Finished&#8221; message serves this purpose.</p>
<p>Essentially the way it works is, the &#8220;Key Exchange&#8221; process outlined above is combined with the &#8220;Signatures&#8221; process. In simple steps, Bob will encrypt the Symmetric Key with Alice&#8217;s Public Key, then &#8220;encrypt&#8221; <em>that</em> with his Private Key. This means anyone can verify it was definitley sent from Bob, but only Alice can extract the actual Symmetric Key.</p>
<p>Glad you enjoyed the series. Good questions!</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: M L		</title>
		<link>https://www.practicalnetworking.net/series/cryptography/using-asymmetric-keys/#comment-167116</link>

		<dc:creator><![CDATA[M L]]></dc:creator>
		<pubDate>Thu, 11 Jun 2020 21:39:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.practicalnetworking.net/?p=221#comment-167116</guid>

					<description><![CDATA[In the section, &quot;Real world encryption......Bob uses Alice’s Public Key to encrypt the Symmetric Secret Key....&quot;. 
Here, Bob has two choices, 
Choice 1: use Alice&#039;s public key: This is the choice Bob picked above. Only Alice can decrypt the message, great. But, how can Alice be certain that Bob sent this &quot;symmetric key&quot;. Could be anyone, since Alice&#039;s public key is available.
OR 
Choice 2: use Bob&#039;s private key: If Bob uses this choice, anyone online can use Bob&#039;s private key and get access to the symmetric key. But, Alice is 100% certain that Bob sent the message.

A related question is, once Alice receives the encrypted symmetric key. Is it a trial and error to decide if she has to use - 
1. her own private key to decrypt
OR
2. Use Bob&#039;s public key to decrypt the message. 
How does Alice decide which key to use to decrypt the message? Try 1, next, try the other, next, ....!

Crypto novice questions, showing my ignorance. :-) 
Great series, very helpful. Appreciate the effort. 
Thanks.

- m]]></description>
			<content:encoded><![CDATA[<p>In the section, &#8220;Real world encryption&#8230;&#8230;Bob uses Alice’s Public Key to encrypt the Symmetric Secret Key&#8230;.&#8221;.<br />
Here, Bob has two choices,<br />
Choice 1: use Alice&#8217;s public key: This is the choice Bob picked above. Only Alice can decrypt the message, great. But, how can Alice be certain that Bob sent this &#8220;symmetric key&#8221;. Could be anyone, since Alice&#8217;s public key is available.<br />
OR<br />
Choice 2: use Bob&#8217;s private key: If Bob uses this choice, anyone online can use Bob&#8217;s private key and get access to the symmetric key. But, Alice is 100% certain that Bob sent the message.</p>
<p>A related question is, once Alice receives the encrypted symmetric key. Is it a trial and error to decide if she has to use &#8211;<br />
1. her own private key to decrypt<br />
OR<br />
2. Use Bob&#8217;s public key to decrypt the message.<br />
How does Alice decide which key to use to decrypt the message? Try 1, next, try the other, next, &#8230;.!</p>
<p>Crypto novice questions, showing my ignorance. 🙂<br />
Great series, very helpful. Appreciate the effort.<br />
Thanks.</p>
<p>&#8211; m</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Ed Harmoush		</title>
		<link>https://www.practicalnetworking.net/series/cryptography/using-asymmetric-keys/#comment-66584</link>

		<dc:creator><![CDATA[Ed Harmoush]]></dc:creator>
		<pubDate>Thu, 03 May 2018 18:58:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.practicalnetworking.net/?p=221#comment-66584</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.practicalnetworking.net/series/cryptography/using-asymmetric-keys/#comment-66184&quot;&gt;Sunny&lt;/a&gt;.

Hi Sunny. Good Question. 

In reality, the original message is not actually encrypted with the Private Key. 

The message is sent through &lt;a href=&quot;http://www.practicalnetworking.net/series/cryptography/hashing-algorithm/&quot; target=&quot;_blank&quot; rel=&quot;noopener&quot;&gt;a hashing algorithm&lt;/a&gt;, and the resulting digest is encrypted with the Private key. 

This allows the receiver (Bob, in this case) to decrypt the digest with the Public key, and compare it to a hash he calculates on the received message. If they match, then it proves the message wasn&#039;t changed since Alice sent it, and only Alice could have created the included digest.

More details on this in the &lt;a href=&quot;#real_signatures&quot; rel=&quot;nofollow&quot;&gt;real world signatures section&lt;/a&gt;.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a href="https://www.practicalnetworking.net/series/cryptography/using-asymmetric-keys/#comment-66184">Sunny</a>.</p>
<p>Hi Sunny. Good Question. </p>
<p>In reality, the original message is not actually encrypted with the Private Key. </p>
<p>The message is sent through <a href="http://www.practicalnetworking.net/series/cryptography/hashing-algorithm/" target="_blank" rel="noopener">a hashing algorithm</a>, and the resulting digest is encrypted with the Private key. </p>
<p>This allows the receiver (Bob, in this case) to decrypt the digest with the Public key, and compare it to a hash he calculates on the received message. If they match, then it proves the message wasn&#8217;t changed since Alice sent it, and only Alice could have created the included digest.</p>
<p>More details on this in the <a href="#real_signatures" rel="nofollow">real world signatures section</a>.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Sunny		</title>
		<link>https://www.practicalnetworking.net/series/cryptography/using-asymmetric-keys/#comment-66184</link>

		<dc:creator><![CDATA[Sunny]]></dc:creator>
		<pubDate>Tue, 01 May 2018 13:34:44 +0000</pubDate>
		<guid isPermaLink="false">http://www.practicalnetworking.net/?p=221#comment-66184</guid>

					<description><![CDATA[In the &quot;Asymmetric Message Signing&quot; section above, it says &quot;If Bob was able to successfully extract a message, and not a scrambled series of bits, then he can be assured that the message must have been originally encrypted by Alice’s Private Key.&quot; What if the message is not meant to be plaintext but binary, ie. a series of bits? How does Bob verify that the series of 1s and 0s was originally encrypted by Alice&#039;s private key?]]></description>
			<content:encoded><![CDATA[<p>In the &#8220;Asymmetric Message Signing&#8221; section above, it says &#8220;If Bob was able to successfully extract a message, and not a scrambled series of bits, then he can be assured that the message must have been originally encrypted by Alice’s Private Key.&#8221; What if the message is not meant to be plaintext but binary, ie. a series of bits? How does Bob verify that the series of 1s and 0s was originally encrypted by Alice&#8217;s private key?</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
