Let me give you my idea of public key/private key usage by going back about
40 years. This is in the day where encryption was performed by mechanical
crypto machines that had a number of rotors that could each be assembled in
various manners. As the encrypter typed the plain text message, the crypto
machine would generate a letter, increment the rotor so that if the same key
was typed, a different letter would be generated. There would be literally
thousands of ways the rotors could be assembled. The message would be the 5
character group messages that Sam Heywood mentioned.
Everybody had machines capable of decoding the message and anyone that had a
radio receiver tuned to the proper frequency could receive the message,
however, in order to decode the message, the recipient had to know how the
rotors were assembled by the sender. Obviously, the sender could not send a
plain text message giving instructions on how to assemble the rotors, yet,
the sender had to tell the intended recipient how to assemble his/her
rotors. This was done at the beginning of the message before the 5 character
groups started, thus:
ALPHA ROMEO ALPHA CHARLIE HOTEL ... (etc.)
This is the PUBLIC KEY. Everyone who received the message received the
Public Key. The people to whom the message was intended would pull out their
code book, turn to the page for the date (and possibly time) the message was
originated, and see that under rotor 1, ALPHA meant to assemble parts a, b,
c, and under rotor 2, ROMEO meant to assemble parts e, f, g, etc. The code
book page is the PRIVATE KEY. A person receiving the message who didn't know
how to set up the rotors, i.e., did not have the PRIVATE KEY, would have to
try the thousands of combinations of rotors in order to decode the message.
The necessary parts are that everyone uses the same procedure to encrypt a
message and that there is some way for the originator to tell the recipient
how the message was encrypted.
In using a secure site, the person sending his/her order would encrypt
his/her order, possibly without knowing it, attach a PUBLIC KEY to it that
would somehow tell the recipient what PRIVATE KEY was used to encrypt the
message.
PC Magazine had an article on how this was done several years ago and I can't
remember exactly (or even generally) what they said.
Hope this helps.
Roger Turk
Tucson, Arizona