*********************************************************** * Description: Knowledge of SSH RSA public and private key * Compatiablity: RDBMS 11g, 12c * Date: 02:55 PM EST, 04/15/2017 *********************************************************** <1> Public/Private Key Cryptography: | |__ Or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner. This accomplishes two functions: authentication, which is when the public key is used to verify that a holder of the paired private key sent the message, and encryption, whereby only the holder of the paired private key can decrypt the message encrypted with the public key. In a public key encryption system, any person can encrypt a message using the public key of the receiver, but such a message can be decrypted only with the receiver's private key. For this to work it must be computationally easy for a user to generate a public and private key-pair to be used for encryption and decryption. <2> Analogy: | |__ Simple speaking, we should call public "Lock" & private "Key" more accurate. Please take "View" as a reference.
Your Comments