P1. Sender generates session symmetric key.
P1. Sender generates session symmetric key. P3.
Session key is encrypted using this public key. Yes, the encrypted secret is attached to the encrypted file. There's no risk in this as this is a session (one-time) key.
Thanks, will accept in 7 mins – Den May 10 at 16:07 Very confused, there is so much crap on the internet, some articles contradict each other :S – Den May 10 at 16:18 @Den I always recommend this book as a basic reading on public key crypto: amazon. Com/gp/product/… – Eugene Mayevski 'EldoS Corp May 10 at 16:24 1 @ceving I suggest that you read how PKI works on large data blocks. See my reference to the book above.
– Eugene Mayevski 'EldoS Corp May 10 at 17:40 1 @ceving guess you've read too much abstract theory. In practice nobody uses plain public-key encryption on large amounts of data just because it doesn't work that way. – Eugene Mayevski 'EldoS Corp May 107 at 13:59.
Public key encryption: An easy way to visualize this is as follows: I send someone an unlocked box that they can put stuff in. Then they close it and it locks. They can ship me the box and I have the only key that will open the lock.
The locked box is the public key encryption; the key is my private key. Symmetric key encryption works like this: We buy a padlock at Home Depot and it comes with two keys. You take one and move to Boston; I take one and move to San Jose.
We can padlock our box and ship it back and forth, only we have the keys.
I cant really gove you an answer,but what I can give you is a way to a solution, that is you have to find the anglde that you relate to or peaks your interest. A good paper is one that people get drawn into because it reaches them ln some way.As for me WW11 to me, I think of the holocaust and the effect it had on the survivors, their families and those who stood by and did nothing until it was too late.