Jump to content

Was successful in creating Key pair on my Windows 8 machine then placing the public key on my lin...


G+_Rud Dog
 Share

Recommended Posts

Was successful in creating Key pair on my Windows 8 machine then placing the public key on my linux client. From there was able to ssh log into the linux client. 

What I found interesting, only because new to this, if you enter a paraphrase when creating the key pair you must enter it each time you run ssh login. Thought that was odd as it gives you 2 steps forward and 1 step backwards. Totally ok with this as I am hearing the security is much better then simple log in with username and password.

Now would like to know what other uses my key pair can be applied to is there ways of using this for lets say logging into you email account or how can this be applied to sending messages as have seen some snippets indicating this can be done. Just haven't found out how.

Anything covering the use and application of key pairs would be appreciated and don't' forget I need layman's approach, please.

Link to comment
Share on other sites

Asymmetric (aka public/private key crypto) is so named because you encrypt with one and decrypt the other.

 

Symmetric crypto uses the same key to encrypt and decrypt.

 

While I don't know much about symmetric crypto, I don't think there's much involved. Just choose some high-entropy noise to be the key and don't let bad guys get it.

 

The 2 parts of asymmetric keys are related to each other in non-trivial ways and therefore require special tools/algorithms to create them.

Link to comment
Share on other sites

Yes, exactly. I'm still learning all the implementations, but security is hard...

 

With asymmetric encryption you give the public key to everyone so they can send you data, but only your private key can decrypt that. The private key is generated first, then it is used to create a public key. An example is SHA-256 which is usually used for SSL. I'm not sure what SSH uses, but wouldn't be surprised if it's SHA as well.

 

Symmetric key crypto uses the same key to encrypt as decrypt. It's great if only trusted will be encrypting and decrypting. Great for file encryption, password vaults, databases, WiFi access... AES probably the most popular. ?

Link to comment
Share on other sites

 Share

×
×
  • Create New...