From 7e6cdfb6e2af55a3d5e7ee57837fa842834c33f5 Mon Sep 17 00:00:00 2001 From: Cedulio Cezar Date: Mon, 6 Jan 2020 15:31:01 +0100 Subject: [PATCH] Fix description of private and public key --- encryption-symmetric-and-asymmetric.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/encryption-symmetric-and-asymmetric.md b/encryption-symmetric-and-asymmetric.md index 667ed22..83a1869 100644 --- a/encryption-symmetric-and-asymmetric.md +++ b/encryption-symmetric-and-asymmetric.md @@ -114,7 +114,7 @@ pubKey: 02c324648931b89e3e8a0fc42c96e8e3be2e42812986573a40d46563bceaf75110 ### Private Keys -Message **encryption** and **signing** is done by a **private key**. The private keys are always kept **secret** by their owner, just like passwords. In the server infrastructure, private key usually stay in an encrypted and protected **keystore**. In the blockchain systems the private keys usually stay in specific software or hardware apps or devices called "**crypto wallets**", which store securely a set of private keys. +Message **decryption** and **signing** is done by a **private key**. The private keys are always kept **secret** by their owner, just like passwords. In the server infrastructure, private key usually stay in an encrypted and protected **keystore**. In the blockchain systems the private keys usually stay in specific software or hardware apps or devices called "**crypto wallets**", which store securely a set of private keys. **Example** of 256-bit private key: @@ -124,7 +124,7 @@ Message **encryption** and **signing** is done by a **private key**. The private ### Public Keys -Message **decryption** and **signature verification** is done by the **public key**. Public keys are by design public information \(not a secret\). It is mathematically infeasible to calculate the private key from its corresponding public key. +Message **encryption** and **signature verification** is done by the **public key**. Public keys are by design public information \(not a secret\). It is mathematically infeasible to calculate the private key from its corresponding public key. In many systems the **public key** is encapsulated in a **digital certificate**, which binds certain identity \(e.g. person or Internet domain name\) to certain public key. In blockchain systems public keys are usually published as parts of the blockchain transactions to help identify who has signed each transaction. In systems like PGP and SSH the public key is downloaded from the server once \(after manual user verification\) and is remembered for further use.