There’s a server, a client, and a hacker in a network. For encryption, the client and the server need to share their private keys. Wouldn’t the hacker be able to grab those during their transmission and decrypt further messages as they please?

  • kevincox
    link
    fedilink
    arrow-up
    2
    ·
    7 months ago

    It depends on the cryptosystem. The private and public halves of the pair are often not symmetrical and often have overlap.

    The parent is likely confused because in most situations the “private key file” will also contain all of the public key. Whether by necessity or for convenience.