<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://www.explainxkcd.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Plugwash</id>
		<title>explain xkcd - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://www.explainxkcd.com/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Plugwash"/>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php/Special:Contributions/Plugwash"/>
		<updated>2026-04-06T08:09:41Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.30.0</generator>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=Talk:1553:_Public_Key&amp;diff=98260</id>
		<title>Talk:1553: Public Key</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=Talk:1553:_Public_Key&amp;diff=98260"/>
				<updated>2015-07-23T19:51:01Z</updated>
		
		<summary type="html">&lt;p&gt;Plugwash: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm assuming he's referring to the GPG/PGP Key. Basically you have a key pair, one private that you use to sign/encrypt and one public, which can be used to verify your private key was used to sign. See [https://en.wikipedia.org/wiki/Public-key_cryptography Wikipedia] for more information. If you posted your private key, anyone could sign as if they were you. I sign pretty much everything (not to mailing lists though), but don't think I've seen anyone else ever do so, even those I know have keys. See [[1181: PGP]] for more. [[Special:Contributions/198.41.235.35|198.41.235.35]] 04:59, 20 July 2015 (UTC)&lt;br /&gt;
&lt;br /&gt;
:Don't believe everything certification authorities are telling you. X.509 SSL certificates works exactly same. Certificate is just a public key signed by certification authority. And yes, you can sign email with X.509 certificate. -- [[User:Hkmaly|Hkmaly]] ([[User talk:Hkmaly|talk]]) 09:54, 20 July 2015 (UTC)&lt;br /&gt;
&lt;br /&gt;
This comic should be added to [[:Category:Cryptography]], but I'm not sure how to do that or whether I can do that. [[User:Nick818|Nick818]] ([[User talk:Nick818|talk]]) 07:06, 20 July 2015 (UTC)&lt;br /&gt;
&lt;br /&gt;
:{{u|Nick818}}—Someone did this today, but for your future reference, you just need to add &amp;lt;tt&amp;gt;&amp;lt;nowiki&amp;gt;[[Category:Cryptography]]&amp;lt;/nowiki&amp;gt;&amp;lt;/tt&amp;gt; to the page that needs to be categorized. It's helpful and customary to add the code to the bottom of the page. Cheers, [[User:Jameslucas|jameslucas]] &amp;lt;small&amp;gt;([[User talk:Jameslucas|&amp;quot; &amp;quot;]] / [[Special:Contributions/Jameslucas|+]])&amp;lt;/small&amp;gt; 10:21, 20 July 2015 (UTC)&lt;br /&gt;
&lt;br /&gt;
This explanation completely misses the point that the PGP workflow is fundamentally flawed which has been stated by more than one expert, e.g. famously last year by Matthew Green, leading to demands to &amp;quot;let it die&amp;quot; and be replaced by something workable. --[[Special:Contributions/108.162.254.190|108.162.254.190]] 11:21, 20 July 2015 (UTC)&lt;br /&gt;
:The problem is, that there isn’t anything more “workable” at the moment. &amp;lt;small&amp;gt;BTW: 7CD1E35FD2A3A158&amp;lt;/small&amp;gt;. --[[User:DaB.|DaB.]] ([[User talk:DaB.|talk]]) 11:27, 20 July 2015 (UTC)&lt;br /&gt;
::Well, I don't want to solve the problem of front-end cryptography here, and this site won't either. But the comic appeared in a climate of a quite general consensus and acceptance of the failure of PGP/GPG, and not technically but because of social and usability reasons. This explanation letting out that is quite comically in itself. --[[Special:Contributions/108.162.254.190|108.162.254.190]] 13:12, 20 July 2015 (UTC)&lt;br /&gt;
:::The main problem of end-to-end email cryptography is serious lack of companies who would actually WANT to do it properly. Most companies are directly interrested in violating your privacy. Keeping hard-to-work-with PGP is in their benefit. -- [[User:Hkmaly|Hkmaly]] ([[User talk:Hkmaly|talk]]) 10:10, 21 July 2015 (UTC)&lt;br /&gt;
&lt;br /&gt;
Remember Responsible Behavior? https://xkcd.com/364/ [[User:Xquestion|Xquestion]] ([[User talk:Xquestion|talk]]) 13:03, 20 July 2015 (UTC)&lt;br /&gt;
&lt;br /&gt;
But did the author post his public key anywhere ? :v [[Special:Contributions/141.101.104.166|141.101.104.166]] 17:29, 20 July 2015 (UTC)&lt;br /&gt;
&lt;br /&gt;
Worth noting that posting his private key actually would be crowdsourcing his signing decisions, since anyone could do it. [[Special:Contributions/108.162.221.102|108.162.221.102]] 04:57, 21 July 2015 (UTC)&lt;br /&gt;
&lt;br /&gt;
    -----BEGIN PGP SIGNED MESSAGE-----&lt;br /&gt;
    Hash: SHA1&lt;br /&gt;
    &lt;br /&gt;
    FWIW, I use PGP. :)&lt;br /&gt;
    -----BEGIN PGP SIGNATURE-----&lt;br /&gt;
    Version: GnuPG v1&lt;br /&gt;
    &lt;br /&gt;
    iEYEARECAAYFAlWuhWoACgkQHkr3KdXO/9A/ZACeM5Oho5XEDZnjo2q4yZBTqABo&lt;br /&gt;
    ET0Ani928heXg9aHmju0e0aK8JV7pvxH&lt;br /&gt;
    =CsEo&lt;br /&gt;
    -----END PGP SIGNATURE-----&lt;br /&gt;
''&amp;amp;mdash; [[User:Tbc|tbc]] ([[User talk:Tbc|talk]]) 18:17, 21 July 2015 (UTC)''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;the keys themselves do not hold &amp;quot;private&amp;quot; or &amp;quot;public&amp;quot; roles until one is released and becomes the public key&amp;quot; --- that might be true of ''some'' crypto-systems, but it is definite '''not''' true of anything based on RSA, such as PGP/GPG. The prime factors (or exponents derived from them) are definitely the &amp;quot;private&amp;quot; part, and the composite product is definitely the &amp;quot;public&amp;quot; part. You '''cannot'' simply choose which part of the pair to make public. [[Special:Contributions/108.162.238.181|108.162.238.181]] 19:54, 21 July 2015 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The prime factors (or exponents derived from them) are definitely the &amp;quot;private&amp;quot; part, and the composite product is definitely the &amp;quot;public&amp;quot; part&amp;quot;. This is completely incorrect. In PGP (or rather, RSA keys used by PGP), both the public and private keys consist of just the modulus '''n''' (composite product) and one of the exponents '''d''' or '''e'''. However, the &amp;quot;public&amp;quot; exponent is typically chosen to be small and with few bits set, so that encryption/decryption using the public key is fast. The private key has to be big in order to keep the search space wide. So by switching around the public and private keys you end up with a public exponent that is a 600 digit number and a private exponent that is probably the number 65537. [[Special:Contributions/198.41.243.252|198.41.243.252]] 09:16, 22 July 2015 (UTC)&lt;br /&gt;
:The public and private exponents are related by the p and q values. You chose one and then calculate the other. Normally you chose the public exponent and generate the private one. It's also common practice to store p and q with the private key for efficency reasons (see: https://en.wikipedia.org/wiki/RSA_%28cryptosystem%29#Using_the_Chinese_remainder_algorithm ). So 108.162.238.181's comment wasn't too far off the mark, the public key in a typical RSA system consists of the modulus and a well-known exponent, the private key in a typical RSA system consists of p,q and various values derived from them. You could build a RSA system with symmetry in the key pair so you can chose either key as the public one but noone does because it would be substantially more computationally intensive and would give little benefit. [[User:Plugwash|Plugwash]] ([[User talk:Plugwash|talk]]) 19:47, 23 July 2015 (UTC)&lt;/div&gt;</summary>
		<author><name>Plugwash</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=1553:_Public_Key&amp;diff=98259</id>
		<title>1553: Public Key</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=1553:_Public_Key&amp;diff=98259"/>
				<updated>2015-07-23T19:50:18Z</updated>
		
		<summary type="html">&lt;p&gt;Plugwash: RM paragraph that is incorrect for most public key cryptosystems.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{comic&lt;br /&gt;
| number    = 1553&lt;br /&gt;
| date      = July 20, 2015&lt;br /&gt;
| title     = Public Key&lt;br /&gt;
| image     = public_key.png&lt;br /&gt;
| titletext = I guess I should be signing stuff, but I've never been sure what to sign. Maybe if I post my private key, I can crowdsource my decisions about what to sign.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==Explanation==&lt;br /&gt;
&lt;br /&gt;
In [https://en.wikipedia.org/wiki/Public-key_cryptography Public-key cryptography], two keys are generated for a user.  The public key can be used to encrypt messages, but not decrypt them.  The private key is necessary for decryption, and as its name implies, is meant to be used solely by the user.&lt;br /&gt;
&lt;br /&gt;
Since the public key is initially designated to be shared, anyone who has that key can send the user an encrypted message that only he or she can decrypt.  Cueball has been following this rule, but he notices that it appears nobody has ever used his public key for anything.  He contemplates sharing his ''private'' key, which he believes would generate more interest in him personally.  However, he appears to overlook the fact that doing so would allow anyone to decrypt messages sent to him, thus defeating the entire purpose of encryption.&lt;br /&gt;
&lt;br /&gt;
The title text refers to another feature of Public-key cryptography: In addition to assuring that certain messages can only be read by a specific key owner, it can also assure that certain messages could only have been ''written'' by a specific key owner, by &amp;quot;signing&amp;quot; it using the private key. Anyone can read a signed message, but readers with the public key can then verify that the owner of the private key wrote (or at least signed) the message, rather than someone pretending to be the owner. If Cueball published his private key, then anybody could sign any message as him, effectively impersonating him and also defeating the purpose of encryption.&lt;br /&gt;
&lt;br /&gt;
{{w|Crowdsourcing}} is the term used for delegating work or tasks to a largely volunteered and uncontrolled set of people on the Internet.  It is similar in concept to {{w|outsourcing}}, in which work is delegated to an external source of labor, typically a company in a foreign country.  Famous instances of crowdsourcing include {{w|reCAPTCHA}} (in which users both verify they are human and help digitize words and phrases in books that digitization software cannot understand) and [http://www.ideaconnection.com/open-innovation-success/Crowdsourcing-Down-on-the-Farm-00304.html a farm in the UK] in which ordinary Internet users make decisions about how the farm is run.  In Cueball's case, delegating decisions about his contracts and spending to the Internet is not likely to be a wise choice.&lt;br /&gt;
&lt;br /&gt;
When Cueball first created the key pair, he imagined it would be something he used from time to time, for reading messages only intended for him or for sending &amp;quot;signed&amp;quot; messages.  Since nothing of the sort happened, he imagines releasing both keys might cause some activity, and at this point he is happier with a &amp;quot;bad&amp;quot; outcome than with a boring one.&lt;br /&gt;
&lt;br /&gt;
Randall previously ironically mentioned a public key in [http://www.explainxkcd.com/wiki/index.php/370 370: Redwall].&lt;br /&gt;
&lt;br /&gt;
==Transcript==&lt;br /&gt;
:[In the first panel, Cueball is sitting in a chair and is using a laptop.]&lt;br /&gt;
:Cueball (thinking): I've been posting my public key for 15 years now, but no one has ever asked me for it or used it for anything as far as I can tell.&lt;br /&gt;
&lt;br /&gt;
:[This is followed by two beat panels where Cueball just sits there. doing nothing, not even thinking.]&lt;br /&gt;
&lt;br /&gt;
:[In the final panel he again uses his laptop and thinks.]&lt;br /&gt;
:Cueball (thinking): Maybe I should try posting my ''private'' key instead.&lt;br /&gt;
&lt;br /&gt;
{{comic discussion}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cryptography]]&lt;br /&gt;
[[Category:Comics featuring Cueball]]&lt;/div&gt;</summary>
		<author><name>Plugwash</name></author>	</entry>

	<entry>
		<id>https://www.explainxkcd.com/wiki/index.php?title=Talk:1553:_Public_Key&amp;diff=98258</id>
		<title>Talk:1553: Public Key</title>
		<link rel="alternate" type="text/html" href="https://www.explainxkcd.com/wiki/index.php?title=Talk:1553:_Public_Key&amp;diff=98258"/>
				<updated>2015-07-23T19:47:27Z</updated>
		
		<summary type="html">&lt;p&gt;Plugwash: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I'm assuming he's referring to the GPG/PGP Key. Basically you have a key pair, one private that you use to sign/encrypt and one public, which can be used to verify your private key was used to sign. See [https://en.wikipedia.org/wiki/Public-key_cryptography Wikipedia] for more information. If you posted your private key, anyone could sign as if they were you. I sign pretty much everything (not to mailing lists though), but don't think I've seen anyone else ever do so, even those I know have keys. See [[1181: PGP]] for more. [[Special:Contributions/198.41.235.35|198.41.235.35]] 04:59, 20 July 2015 (UTC)&lt;br /&gt;
&lt;br /&gt;
:Don't believe everything certification authorities are telling you. X.509 SSL certificates works exactly same. Certificate is just a public key signed by certification authority. And yes, you can sign email with X.509 certificate. -- [[User:Hkmaly|Hkmaly]] ([[User talk:Hkmaly|talk]]) 09:54, 20 July 2015 (UTC)&lt;br /&gt;
&lt;br /&gt;
This comic should be added to [[:Category:Cryptography]], but I'm not sure how to do that or whether I can do that. [[User:Nick818|Nick818]] ([[User talk:Nick818|talk]]) 07:06, 20 July 2015 (UTC)&lt;br /&gt;
&lt;br /&gt;
:{{u|Nick818}}—Someone did this today, but for your future reference, you just need to add &amp;lt;tt&amp;gt;&amp;lt;nowiki&amp;gt;[[Category:Cryptography]]&amp;lt;/nowiki&amp;gt;&amp;lt;/tt&amp;gt; to the page that needs to be categorized. It's helpful and customary to add the code to the bottom of the page. Cheers, [[User:Jameslucas|jameslucas]] &amp;lt;small&amp;gt;([[User talk:Jameslucas|&amp;quot; &amp;quot;]] / [[Special:Contributions/Jameslucas|+]])&amp;lt;/small&amp;gt; 10:21, 20 July 2015 (UTC)&lt;br /&gt;
&lt;br /&gt;
This explanation completely misses the point that the PGP workflow is fundamentally flawed which has been stated by more than one expert, e.g. famously last year by Matthew Green, leading to demands to &amp;quot;let it die&amp;quot; and be replaced by something workable. --[[Special:Contributions/108.162.254.190|108.162.254.190]] 11:21, 20 July 2015 (UTC)&lt;br /&gt;
:The problem is, that there isn’t anything more “workable” at the moment. &amp;lt;small&amp;gt;BTW: 7CD1E35FD2A3A158&amp;lt;/small&amp;gt;. --[[User:DaB.|DaB.]] ([[User talk:DaB.|talk]]) 11:27, 20 July 2015 (UTC)&lt;br /&gt;
::Well, I don't want to solve the problem of front-end cryptography here, and this site won't either. But the comic appeared in a climate of a quite general consensus and acceptance of the failure of PGP/GPG, and not technically but because of social and usability reasons. This explanation letting out that is quite comically in itself. --[[Special:Contributions/108.162.254.190|108.162.254.190]] 13:12, 20 July 2015 (UTC)&lt;br /&gt;
:::The main problem of end-to-end email cryptography is serious lack of companies who would actually WANT to do it properly. Most companies are directly interrested in violating your privacy. Keeping hard-to-work-with PGP is in their benefit. -- [[User:Hkmaly|Hkmaly]] ([[User talk:Hkmaly|talk]]) 10:10, 21 July 2015 (UTC)&lt;br /&gt;
&lt;br /&gt;
Remember Responsible Behavior? https://xkcd.com/364/ [[User:Xquestion|Xquestion]] ([[User talk:Xquestion|talk]]) 13:03, 20 July 2015 (UTC)&lt;br /&gt;
&lt;br /&gt;
But did the author post his public key anywhere ? :v [[Special:Contributions/141.101.104.166|141.101.104.166]] 17:29, 20 July 2015 (UTC)&lt;br /&gt;
&lt;br /&gt;
Worth noting that posting his private key actually would be crowdsourcing his signing decisions, since anyone could do it. [[Special:Contributions/108.162.221.102|108.162.221.102]] 04:57, 21 July 2015 (UTC)&lt;br /&gt;
&lt;br /&gt;
    -----BEGIN PGP SIGNED MESSAGE-----&lt;br /&gt;
    Hash: SHA1&lt;br /&gt;
    &lt;br /&gt;
    FWIW, I use PGP. :)&lt;br /&gt;
    -----BEGIN PGP SIGNATURE-----&lt;br /&gt;
    Version: GnuPG v1&lt;br /&gt;
    &lt;br /&gt;
    iEYEARECAAYFAlWuhWoACgkQHkr3KdXO/9A/ZACeM5Oho5XEDZnjo2q4yZBTqABo&lt;br /&gt;
    ET0Ani928heXg9aHmju0e0aK8JV7pvxH&lt;br /&gt;
    =CsEo&lt;br /&gt;
    -----END PGP SIGNATURE-----&lt;br /&gt;
''&amp;amp;mdash; [[User:Tbc|tbc]] ([[User talk:Tbc|talk]]) 18:17, 21 July 2015 (UTC)''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;the keys themselves do not hold &amp;quot;private&amp;quot; or &amp;quot;public&amp;quot; roles until one is released and becomes the public key&amp;quot; --- that might be true of ''some'' crypto-systems, but it is definite '''not''' true of anything based on RSA, such as PGP/GPG. The prime factors (or exponents derived from them) are definitely the &amp;quot;private&amp;quot; part, and the composite product is definitely the &amp;quot;public&amp;quot; part. You '''cannot'' simply choose which part of the pair to make public. [[Special:Contributions/108.162.238.181|108.162.238.181]] 19:54, 21 July 2015 (UTC)&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The prime factors (or exponents derived from them) are definitely the &amp;quot;private&amp;quot; part, and the composite product is definitely the &amp;quot;public&amp;quot; part&amp;quot;. This is completely incorrect. In PGP (or rather, RSA keys used by PGP), both the public and private keys consist of just the modulus '''n''' (composite product) and one of the exponents '''d''' or '''e'''. However, the &amp;quot;public&amp;quot; exponent is typically chosen to be small and with few bits set, so that encryption/decryption using the public key is fast. The private key has to be big in order to keep the search space wide. So by switching around the public and private keys you end up with a public exponent that is a 600 digit number and a private exponent that is probably the number 65537. [[Special:Contributions/198.41.243.252|198.41.243.252]] 09:16, 22 July 2015 (UTC)&lt;br /&gt;
:The public and private exponents are related by the p and q values. You chose one and then calculate the other. Normally you chose the public exponent and generate the private one. It's also common practice to store p and q with the private key for efficency reasons (see: https://en.wikipedia.org/wiki/RSA_%28cryptosystem%29#Using_the_Chinese_remainder_algorithm ). So 108.162.238.181's comment wasn't too far off the mark, the public key in a typical system consists of the modulus and a well-known exponent, the private key in a typical RSA system consists of p,q and various values derived from them. You could build a RSA system with symmetry in the key pair so you can chose either key as the public one but noone does because it would be substantially more computationally intensive and would give little benefit. [[User:Plugwash|Plugwash]] ([[User talk:Plugwash|talk]]) 19:47, 23 July 2015 (UTC)&lt;/div&gt;</summary>
		<author><name>Plugwash</name></author>	</entry>

	</feed>