INVITATION TO CYBERSECURITY 166 RSA is elegant and simple to implement in software. Anybody can quickly generate a key pair on the privacy of their own computer (see Figure 7.11). Once they have a key pair, they can widely advertise one of the keys, the public key, and keep the other key, known as the private key, secret (see Figure 7.12). Files encrypted with the public key can only be decrypted with the private key. There is not a perfect analogy to a classic system in physical space that works similarly. One picture would be a lock that can only be locked with one key and can only be unlocked with a different key. Figure 7.11 Using OpenSSL to generate an RSA key pair.
RkJQdWJsaXNoZXIy MTM4ODY=