>
> If the pub key is used to encrypt, then we can use the private key to
> decrypt
>
> If the priv key is used to encrypt, then we can use the pub key to decrypt.
>
>
Well. As far as I know it is more like this:

I use my private key AND your public key. I put both of them into a
algoritm. The output from that is a static password. This password do I use
to encrypt all traffic I will send to you, and I will use the same password
to decrypt all received traffic.

When you take YOUR private key and MY public key and put them into the same
algoritm You will get the same static password.

So, in practice, all traffic is encrypted/decrypted in both ends by the same
"pre-shared-key". The only thing with PKI is that our combinations of
private and public keys makes it unneccesary to ever exchange this
pre-shared-key. Instead it is derived from our public and private keys.

Br Jimmy
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to