Achieving Privacy through Asymmetric Cryptography
How can I achieve Privacy through Encryption with Asymmetric Cryptography? When you start using this animation website, you are first acting in the role of Bob. Bob has two keys: His public key is encloesd in a website symbol () - Bob has published this key on his homepage for anyone to download. His private key, however, is enclosed in a safe symbol () - Bob keeps this key safe from anyone else accessing this key! Since Bob's computer is connected to the Internet, Bob can also access Alice's public key, which she published on her homepage just like Bob published his public key on his website. Now Bob wants to send Alice a message which only Alice will be able to decrypt. In order to achieve this, Bob needs to encrypt his message to Alice using Alice's private key. Help Bob with encrypting and sending his message:
Now it is Alice's turn to decrypt Bob's message. Click the button "Alice's computer" of Alice's computer to switch to the role of Alice. Then help her decrypt Bob's message:
Task: Alice wants to tell Bob - and Bob only! - the name
of her favourite band. Notice: This animation only supports the encryption of lower case letters, full stop and comma. Numbers should be spelled out such as "five" for "5"! * The keys you find in the text fields upon loading the animation are only a proposal. There are other possible pairs of keys, such as these. If you would like to use a differen pair of keys simply edit the numbers in the text fields surrounded by the symbols for the private and public key accordingly.
(c) 2010 Andreas
Gramm |