Editing 364: Responsible Behavior

Jump to: navigation, search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 12: Line 12:
 
In order to send encrypted mail to people, you need to know their {{w|Public-key_cryptography|public key}}. You use this key to encrypt the email, and only they can read it (using their private key).  However, there is the problem of authentication: how do you know for certain that the key belongs to the person to whom you think it does?  It could be someone else masquerading as them, hoping for people to send them sensitive information.  They could decrypt and read your mail, and could even re-encrypt it using the genuine public key of the intended recipient, and then pass the message onto them, leaving both you and the recipient unaware of the interception. This is a type of {{w|Man-in-the-middle_attack|man-in-the-middle attack}}.
 
In order to send encrypted mail to people, you need to know their {{w|Public-key_cryptography|public key}}. You use this key to encrypt the email, and only they can read it (using their private key).  However, there is the problem of authentication: how do you know for certain that the key belongs to the person to whom you think it does?  It could be someone else masquerading as them, hoping for people to send them sensitive information.  They could decrypt and read your mail, and could even re-encrypt it using the genuine public key of the intended recipient, and then pass the message onto them, leaving both you and the recipient unaware of the interception. This is a type of {{w|Man-in-the-middle_attack|man-in-the-middle attack}}.
  
βˆ’
One solution for this is that people {{w|Keysigning|sign each other's keys}}. It works like this: say you want to send an email to {{w|Alice and Bob|Bob}}, but you've never met him. You find his key online (they are stored on certain servers, like cryptographic phone books), but how can you be sure that it's really his? Well, turns out that you have a mutual friend [[177: Alice and Bob|Alice]], and you have her public key and you know that it is hers. If Alice has signed Bob's key with her private key (which only she has access to), it means that she's certain that that really is Bob's key. So then you can be sure that Bob's key is genuine (since you have a common friend, Alice) and that your communications will be safe.
+
One solution for this is that people {{w|Keysigning|sign each other's keys}}. It works like this: say you want to send an email to {{w|Alice and Bob|Bob}}, but you've never met him. You find his key online (they are stored on certain servers, like cryptographic phone books), but how can you be sure that it's really his? Well, turns out that you have a mutual friend [[177:Alice and Bob|Alice]], and you have her public key and you know that it is hers. If Alice has signed Bob's key with her private key (which only she has access to), it means that she's certain that that really is Bob's key. So then you can be sure that Bob's key is genuine (since you have a common friend, Alice) and that your communications will be safe.
  
 
A {{w|Key_signing_party|key-signing party}} is simply a super-geeky party where people meet in real life so that they can be sure of people's identity, and then everyone signs everyone else's keys. It's a good way to expand the web of trust. The joke here is that he has no idea who this girl is and yet he still signed her key. This is dangerous, because he is vouching for her identity. If he is mistaken, this could result in a serious loss of credibility on his part.  
 
A {{w|Key_signing_party|key-signing party}} is simply a super-geeky party where people meet in real life so that they can be sure of people's identity, and then everyone signs everyone else's keys. It's a good way to expand the web of trust. The joke here is that he has no idea who this girl is and yet he still signed her key. This is dangerous, because he is vouching for her identity. If he is mistaken, this could result in a serious loss of credibility on his part.  

Please note that all contributions to explain xkcd may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see explain xkcd:Copyrights for details). Do not submit copyrighted work without permission!

To protect the wiki against automated edit spam, we kindly ask you to solve the following CAPTCHA:

Cancel | Editing help (opens in new window)