From a0ca0f0e0c623b7000fcadc08fd12d3eee7afd2d Mon Sep 17 00:00:00 2001 From: "Kyle J. McKay" Date: Tue, 6 Oct 2015 06:13:17 -0700 Subject: [PATCH] pkiprimer.html: fix typo Signed-off-by: Kyle J. McKay --- www/pkiprimer.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/www/pkiprimer.html b/www/pkiprimer.html index 449816b..23b4e8d 100644 --- a/www/pkiprimer.html +++ b/www/pkiprimer.html @@ -181,7 +181,7 @@ SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Private Parts

-

The entire Public Key Infrastructure (PKI) is based on the concept of public key cryptography. This is the idea that certain mathematical operations are relatively easy to perform whereas their inverse is not. For example, multiplying two very large prime numbers together is not difficult – it make take some time but it can be done. On the other hand, factoring that very large result to recover the primes could be extremely difficult without knowing one of the primes in advance. More about this can be found in the wikipedia article.

+

The entire Public Key Infrastructure (PKI) is based on the concept of public key cryptography. This is the idea that certain mathematical operations are relatively easy to perform whereas their inverse is not. For example, multiplying two very large prime numbers together is not difficult – it may take some time but it can be done. On the other hand, factoring that very large result to recover the primes could be extremely difficult without knowing one of the primes in advance. More about this can be found in the wikipedia article.

The bottom line is that the "key"s used in public cryptography can be split into a public part and a private part. The "public" part may be shared with the whole world, but nobody else should ever get a hold of your "private" part.

-- 2.11.4.GIT