Quote:
Originally posted by Taliban Whatever you can decrypt, you can also encrypt.
Your idea of one key only being able to decrypt something will not work. Current cryptographic programs work about this way:
There's key A and key B, you only need key A to encrypt but key A and key B to decrypt. So if you can decrypt something, you'll have both keys and therefore you'll be able to encrypt it also.
There is no crypto-algorithm that works the other way round. |
"Data scrambled with Bob's private key can only be unscrambled with Bob's public key."
- PKI for Dummies:
http://www.nwfusion.com/news/64452_05-17-1999.html