|Huh. No. You have private keys and public keys. Public keys are distributed
|and can be used to encrypt data that only the private key can decrypt.
|Private keys can be used to sign data (actually it encrypts a hash value of
|the data such as MD5 or SHA1) and this signature can be verified
|(decrypted)
|by the public key. This is essentially true of all "public key"
|cryptography.

If the private key is hashed while signing it by MD5 or SHA1 (both of which
are irreversible) then how does the public key decrypt it??

Reply via email to