Liste des Groupes | Revenir à s crypt |
On 7/10/2025 10:19 AM, Stefan Claas wrote:Actually, I think that is a rather normal way to do things? Gain the key, then use the symmetric cipher with said key?Chris M. Thomasson wrote:Basically, that is outside of the scope of my symmetric cipher. Secure key exchange is something else, another beast so to speak. However, once a key is exchanged, securely, then it can be used for my cipher or any other symmetric cipher? Fair enough?On 7/9/2025 12:53 PM, Stefan Claas wrote:>>How does it work if A encrypts on local host and B should decrypt on his>
local host, with that given link from A
Wrt the online version:
>
A needs to send/give B the ciphertext somehow, email, snail mail,
somehow, hand signals, ect... ;^) Then B, assuming that A and B have the
same secret key, can use said ciphertext to decrypt it. So, if you
notice the online program has a ciphertext only, without a link prefix.
Say this example: I am encrypting the message on my local host using the
default key:
But how, for example, would you give me the secret key, from the USA to
Germany, without meeting in person?
Les messages affichés proviennent d'usenet.