Welcome to the Treehouse Community
Want to collaborate on code errors? Have bugs you need feedback on? Looking for an extra set of eyes on your latest project? Get support with fellow developers, designers, and programmers of all backgrounds and skill levels here with the Treehouse Community! While you're at it, check out some resources Treehouse students have shared here.
Looking to learn something new?
Treehouse offers a seven day free trial for new students. Get access to thousands of hours of content and join thousands of Treehouse students and alumni in the community today.
Start your free trialWilliam King
358 Points1:58 - craig encrypted this lunch.txt.gpg file "with my private key" should this be kenneth's public key?
1:58 - craig encrypted this lunch.txt.gpg file "with my private key" should this be kenneth's public key?
1 Answer
Rex Beatie
2,010 PointsNo, each person should have their own private key ( or share a private key, depending on the algorithm.) In an asymmetric pattern each person would have their own private key, and there would be a common shared public key. Diffie-Helman is a common and good pattern that shows how to share a secret value and keep it a secret using a public value (public key).
Biljana Sotirovska
Full Stack JavaScript Techdegree Graduate 25,952 PointsBiljana Sotirovska
Full Stack JavaScript Techdegree Graduate 25,952 PointsNo wait, William's concern is correct. I clicked on the questions tab specifically for that. The video for encryption is clear on that, on 2:34 Kenneth says:
Also in the quiz, there is this true-false question: In private key encryption, Alice would use Bob's public key to encrypt a message for him where the correct answer is true. Replace Alice with Craig and Bob with Kenneth and you realize that either there is something wrong on 1:58 or something is missing from the explanations.
Can someone from Treehouse team please clarify? Thanks.