On Sun, 09 Jan 2000 18:40:35 -0800, Clarence Verge wrote:

> Samuel W. Heywood wrote:

>> I do not understand how I could encrypt my credit card number, transmit
>> the encrypted number, and then have the recipient to decrypt the number
>> unless the recipient had a compatible decryption engine and had
>> knowledge of the original encryption key (i.e the password or pass
>> phrase that I use to encrypt the data).  It would seem that somehow
>> this kind of thing is what would have to happen when using a "secure"
>> web site.  How does this kind of "magic" work?

> Hi Sam;

> I don't know of a site that will provide the details you are looking for,
> and, the following is just my own bumble so don't take it as fact.

> Surely the simplest method would require that the recipient involved sends
> you the encryption key and then you send the encrypted data.

> How this prevents someone eavesdropping on the transaction from decrypting
> your data is unclear to me because it seems he/she can end up with all the
> necessary information.

> Like I said. My bumble.

Guys.....go to Dr.DobbsJournal at http://www.ddj.com/ of buy their
CDROM....they have had oodles of articles on this "public key
encryption" over the recent years....

           gregy

..BUT...don't ask me to explain here....I can understand the articles
but I couldn't do the concept justice....




-- This mail was written by user of Arachne, the 
       Ultimate Internet Client

Reply via email to