Let’s say two kids are discussing a secret plan about how they should coordinate a surprise at a family gathering, while amidst adults / elders around, without them knowing. However, both kids are smart enough to know that they’d need to use completely different and unique “secret” code-language while conversing in order not to raise any suspicions from anyone eavesdropping on them. So Kid-1 decides to speak the syllables backwards, as their “secret” code-language, and kid-2 will need to reverse all that gibberish in order to make sense of what kid-1 has just said. Similarly, kid-2 decides a different way, say, replacing vowels with the next in dictionary order of-course, so kid-1 should be aware of that “tactic” in order to decipher what kid-2 has replied.
Pretty Good Privacy typically is used for P2P ( peer-to-peer ) communications, in which both peers exchange their public-keys ( as in, their “code” language tactic ), and expect messages from the peer encrypted / ciphered specifically in that format, so they can use their private-key to decipher locally. This is all to ensure no eavesdropping ever occurs.
Latest Answers