alexhamill

Reflection on encryption

symmetric and asymmetric encryption

symetric

aysmmertic

steps of encryption

  1. person reciving the message sends their public key to the sender
  2. person sending the message encrypts the message with the recivers public key
  3. sender sends the encrypted message
  4. reciver gets the message and uses their private key to decrypt the message

dont share your key

if you share your public key people can decrypt the messages that you are sending throughout all of the internet just as if they were being shouted in a room and they can read eveything you are doing online.