monoman
Master baiter - I fish!
- Joined
- Mar 23, 2004
- Messages
- 967
In trying to understand asymmetrical encryption, I thought of a way to do it that doesn't involve large prime numbers. If someone can explain to me why it isn't done in the way I thought of, I'll have a firmer grasp of the way it's actually implemented.
So, Person A wants to send a secret email to person B:
(1) Person A adds a different random number to each letter of the message and, keeping a note of those random numbers, sends the email to person B.
(2) Person B adds a different random number to each letter of the message and, keeping a note of those random numbers, sends the email back to person A.
(3) Person A takes off the numbers they added and sends it back to person B
(4) Person B takes off the numbers they added and they have the unencrypted message.
So, Person A wants to send a secret email to person B:
(1) Person A adds a different random number to each letter of the message and, keeping a note of those random numbers, sends the email to person B.
(2) Person B adds a different random number to each letter of the message and, keeping a note of those random numbers, sends the email back to person A.
(3) Person A takes off the numbers they added and sends it back to person B
(4) Person B takes off the numbers they added and they have the unencrypted message.
Last edited: