When Alice encrypts a message using her private key before sending it to Bob What will Bob need to decrypt Alices message?

When Alice encrypts a message using her private key before sending it to Bob What will Bob need to decrypt Alices message?

Prof Bill Buchanan OBE

Nov 14, 2021

4 min read

When Alice encrypts a message using her private key before sending it to Bob What will Bob need to decrypt Alices message?

Photo by Erik Mclean on Unsplash

Last we a student took one of our cryptography test and answered a question saying that Alice will use her public key to encrypt for Bob, and then Bob uses his private key to decrypt. Well, I marked it wrong … and for good reason. But there is a method that does this, and it is named…

When Alice sends a message to Bob what key will she use to encrypt the message?

If Alice sends Bob a message and that message is encrypted with two keys simultaneously: a symmetric key (Ks) and Bob's public key. The symmetric key (Ks) is also sent to Bob, encrypted with the private key of Alice.

How does Alice guarantee to Bob that it was her who sent the message and that the message wasn't modified during transmission without encrypting the entire message?

Generally, for signature purposes Alice will encrypt not her entire message but simply a secure hash of it, and then send both the message and the RSA-encrypted hash. Bob decrypts the encrypted hash, and the signature checks out if the result matches the hash of the corresponding message.

Which type of crypto key can be used to encrypt a message from Alice to Bob where only Bob can be expected to decrypt it?

Alice generates a random symmetric key (usually called a session key), encrypts it with Bob's public key and sends it to Bob. Bob decrypts the session key with his private key. Alice and Bob exchange messages using the session key.

How does the private key decrypt the message?

Private key encryption systems use a single key that is shared between the sender and the receiver. Both must have the key; the sender encrypts the message by using the key, and the receiver decrypts the message with the same key.