On Tue, 11 Jan 2000 09:11:04 -0500, Roger Turk wrote:

> Let me give you my idea of public key/private key usage by going back about
> 40 years.  This is in the day where encryption was performed by mechanical
> crypto machines that had a number of rotors that could each be assembled in
> various manners.  As the encrypter typed the plain text message, the crypto
> machine would generate a letter, increment the rotor so that if the same key
> was typed, a different letter would be generated.  There would be literally
> thousands of ways the rotors could be assembled.  The message would be the 5
> character group messages that Sam Heywood mentioned.

> Everybody had machines capable of decoding the message and anyone that had a
> radio receiver tuned to the proper frequency could receive the message,
> however, in order to decode the message, the recipient had to know how the
> rotors were assembled by the sender.  Obviously, the sender could not send a
> plain text message giving instructions on how to assemble the rotors, yet,
> the sender had to tell the intended recipient how to assemble his/her
> rotors.  This was done at the beginning of the message before the 5 character
> groups started, thus:

> ALPHA ROMEO ALPHA CHARLIE HOTEL ... (etc.)

> This is the PUBLIC KEY.  Everyone who received the message received the
> Public Key.  The people to whom the message was intended would pull out their
> code book, turn to the page for the date (and possibly time) the message was
> originated, and see that under rotor 1, ALPHA meant to assemble parts a, b,
> c, and under rotor 2, ROMEO meant to assemble parts e, f, g, etc.  The code
> book page is the PRIVATE KEY.  A person receiving the message who didn't know
> how to set up the rotors, i.e., did not have the PRIVATE KEY, would have to
> try the thousands of combinations of rotors in order to decode the message.

> The necessary parts are that everyone uses the same procedure to encrypt a
> message and that there is some way for the originator to tell the recipient
> how the message was encrypted.

> In using a secure site, the person sending his/her order would encrypt
> his/her order, possibly without knowing it, attach a PUBLIC KEY to it that
> would somehow tell the recipient what PRIVATE KEY was used to encrypt the
> message.

> PC Magazine had an article on how this was done several years ago and I can't
> remember exactly (or even generally) what they said.

> Hope this helps.

Roger.....greetings, fellow former Crypto Technician

              gregy




-- This mail was written by user of Arachne, the 
       Ultimate Internet Client

Reply via email to