mirror of
https://codeberg.org/openpgp/notes.git
synced 2024-11-23 08:02:05 +01:00
expand on hybrid concept, mark for move
This commit is contained in:
parent
e1f0452ccd
commit
bd468da34f
1 changed files with 8 additions and 4 deletions
|
@ -128,10 +128,14 @@ Digital signatures in OpenPGP are used in two primary contexts:
|
|||
(hybrid_cryptosystems)=
|
||||
## Hybrid cryptosystems
|
||||
|
||||
OpenPGP uses a hybrid cryptosystem. [Hybrid cryptosystems](https://en.wikipedia.org/wiki/Hybrid_cryptosystem) combine the use of symmetric and asymmetric (public-key) cryptography to capitalize on the strengths of each.
|
||||
OpenPGP uses a hybrid cryptosystem. [Hybrid cryptosystems](https://en.wikipedia.org/wiki/Hybrid_cryptosystem) combine the use of symmetric and asymmetric (public-key) cryptography to capitalize on the strengths of each, namely symmetric cryptography's speed and efficiency and public-key cryptography's mechanism for secure key exchange.
|
||||
|
||||
```{admonition}
|
||||
:class: warning
|
||||
|
||||
Move this to the chapter that details it:
|
||||
|
||||
Within OpenPGP's hybrid system, so-called "session keys" are central. They are generated uniquely for each session and are instrumental in both encrypting and decrypting the actual message content, using the efficiency of symmetric-key cryptography.
|
||||
|
||||
Using asymmetric (public-key) cryptography, the session keys are also encrypted. This ensures that only the intended recipient, the holder of the corresponding private key, can decrypt and gain access to the session key. With the decrypted session key, they can then use the session key to decrypt the actual message.
|
||||
|
||||
OpenPGP's dual-layered security thus capitalizes on symmetric cryptography's speed and efficiency and asymmetric (public-key) cryptography's mechanism for secure key exchange.
|
||||
Using asymmetric (public-key) cryptography, the session keys are also encrypted. This ensures that only the intended recipient, the holder of the corresponding private key, can decrypt and gain access to the session key. With the decrypted session key, they can then use the session key to decrypt the actual message.
|
||||
```
|
Loading…
Reference in a new issue