From bd468da34fff868f516cc352552bd4d5dbbae3e8 Mon Sep 17 00:00:00 2001 From: "Tammi L. Coles" Date: Fri, 13 Oct 2023 17:47:58 +0200 Subject: [PATCH] expand on hybrid concept, mark for move --- book/source/03-cryptography.md | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-) diff --git a/book/source/03-cryptography.md b/book/source/03-cryptography.md index f1b56bf..6673a8c 100644 --- a/book/source/03-cryptography.md +++ b/book/source/03-cryptography.md @@ -128,10 +128,14 @@ Digital signatures in OpenPGP are used in two primary contexts: (hybrid_cryptosystems)= ## Hybrid cryptosystems -OpenPGP uses a hybrid cryptosystem. [Hybrid cryptosystems](https://en.wikipedia.org/wiki/Hybrid_cryptosystem) combine the use of symmetric and asymmetric (public-key) cryptography to capitalize on the strengths of each. +OpenPGP uses a hybrid cryptosystem. [Hybrid cryptosystems](https://en.wikipedia.org/wiki/Hybrid_cryptosystem) combine the use of symmetric and asymmetric (public-key) cryptography to capitalize on the strengths of each, namely symmetric cryptography's speed and efficiency and public-key cryptography's mechanism for secure key exchange. + +```{admonition} +:class: warning + +Move this to the chapter that details it: Within OpenPGP's hybrid system, so-called "session keys" are central. They are generated uniquely for each session and are instrumental in both encrypting and decrypting the actual message content, using the efficiency of symmetric-key cryptography. -Using asymmetric (public-key) cryptography, the session keys are also encrypted. This ensures that only the intended recipient, the holder of the corresponding private key, can decrypt and gain access to the session key. With the decrypted session key, they can then use the session key to decrypt the actual message. - -OpenPGP's dual-layered security thus capitalizes on symmetric cryptography's speed and efficiency and asymmetric (public-key) cryptography's mechanism for secure key exchange. \ No newline at end of file +Using asymmetric (public-key) cryptography, the session keys are also encrypted. This ensures that only the intended recipient, the holder of the corresponding private key, can decrypt and gain access to the session key. With the decrypted session key, they can then use the session key to decrypt the actual message. +``` \ No newline at end of file