I saw that people on the dark web would sign their posts with a PGP key to prove that their account has not been compromised. I think I understand the concept of how private and public keys work but I must be missing something because I don’t see how it proves anything.
I created a key and ran gpg --export --armor fizz@… and I ran that twice and both blocks were identical. If I posted my public key block couldn’t someone copy and paste that under their message and claim to be me?
EDIT: changed encryption / decryption to signing / veryfing. Thanks for the corrections
Not an expert, those who know more please correct me.
From what I understand, what they post is not a PGP key, but the same content published in clear text signed with their private key. That way anyone can verify it with the author’s public key to check it has been generated with the private one (that only one person should have).
You’ve got it backward. You encrypt with the public key, and decrypt with the private key. Otherwise, you’re spot on.
For signing, it’s backwards - you encrypt with the private key, and then everyone else can decrypt with the public key. If that doesn’t work, they know that the message wasn’t signed by the private key paired with the public key they have, and therefore is invalid and is not to be trusted.
Signing proves authenticity (only the private key holder can sign), encryption provides privacy (only the private key holder can read)
Isn’t that for when you want to send a message to someone so only the recipient can read it?
If I understand correctly, OP is asking about signatures to prove the posted content comes from a specific source.
Anyway, thanks for the review!
https://en.m.wikipedia.org/wiki/Public-key_cryptography
Sorry, but I still think I’m saying the same thing as in that paragraph:
Look at the words you used, encryption is not the same as a signature, with a signature you can prove that a person with access to the private key wrote the message.
What you’re talking about in your message is encryption, and you have it the wrong way around, messages gets encrypted with the public key, and can only be read with the private key.
We may be getting somewhere…
So they are not excrypting it, but do we agree that with signatures the author uses their private key + the clear message to generate “something”?
… so then anyone can use the author’s public key to check that “something” against the clear mesage to confirm the author’s identity?
If that’s the case, then my error is that the operation to generate the signature is not an encryption. So, may I ask… what is it? A special type of hash?
Thanks again. I will edit my original comment with the corrections once I understand it correctly.
Yeah sure, and I think the person you are arguing with is saying as much as well, it’s just that this is not encrypting it, when you encrypt something you obfuscate it in a way that is possible to deobfuscate, think the caesar cipher as a simple encryption, a hash/signature on the other hand is something that is generated from the clear text using your private key, which is not possible to decrypt, think very simplified that the person would just put the amount of each letter of the alphabet used in in the text, then add the length of the thread, and then multiplied by your private key. This way it’s proven that the holder of the private key is the person writing the text, and that the text hasn’t changed since the signature was generated.
They can confirm that the person holding the private key (not identity, just that they have the key) and also that nobody changed it since they signed it (like the person adminning the forum or a moderator or something)
It’s basically a hashing function yeah.
Thanks, now it’s clear.
I corrected my original comment.
You’re not though. You said encryption occurs with the public key and decryption occurs with the private. That’s the opposite of what happens and what the quoted text says.
From the same source:
I’m sad that I edited some typos on my original message because now you will probably think I changed it. But I said the opposite.
Anyway, there is probably some missunderstanding here and I don’t think this conversation is useful.
Thanks for the feedback.
Funny story: you didn’t change the wrong info. The sad part is that you’re spreading misinformation and unwilling to hear otherwise. This is more dangerous than helpful.
How is Crul wrong in anything other than the terminology? You sign a document with your private key - generating basically a hash of the document entangled with your key information. Anyone holding the public key can then verify that hash with the public key - that the document contents are intact and unchanged (from the hash), and generated by the person holding the private key (entangled key information)
Sorry, I’m very confused. Both of us seem very confident in our positions, so clearly one of use is c/confidentlyincorrect…
I will wait until a third party helps us identify who is wrong and I will be very happy to correct any mistake if that’s the case.