There’s 3 tools to encryption that work in tandem. Symmetric key, Asymmetric Key, and Hashing.
Symmetric key is simple it’s the same key on two computers that codes/decodes but like you said – is unsafe to distribute and could be intercepted.
It can be distributed through asymmetric key. I keep a private key and distribute a public key. Messages encrypted through the public key can ONLY decrypted by the private key I own. This doesn’t confirm my identity tho someone could pretend to be me and provide you with the wrong public key.
A hashing program produces a unique code for a piece of data that *cannot* be reverse engineered. Hashing the public key before you use it can verify it’s uniqueness.
That’s the gist of it anyways
Latest Answers