Code. . Hoo RH I TU mm tter? tum Rt FIND ‘M. One day. use and Beth started Alter thell first date. Bah sent dating, Alice a message encrypted with E purble Hear Code Hoo RH I TU mm tter? tum Rt FIND ‘M One day use and Beth started Alter thell first date Bah sent dating Alice a message encrypted with E purble Hear
Upload
Login or register

Code

Click to block a category:GamingPoliticsNewsComicsAnimeOther
Hoo RH I TU
mm tter?
tum
Rt FIND ‘M.
One day. use and Beth started Alter thell first date. Bah sent
dating, Alice a message encrypted with
E purble Hear.
Bob and Alitle dated far years. what But: never told her what the
encrypted message said.
sear' r.
until. one night. Mee made a Bob was sure that by the time
h, she crashed the messages"
and every night, Ailee trlld he
deg met the message.
mam Yoo MOWRY HE?
will have really meant it
...
+226
Views: 15765 Submitted: 09/23/2013
Hide Comments
Leave a comment Refresh Comments (18)
> hey anon, wanna give your opinion?
asd
#7 - bubetto
Reply +22 123456789123345869
(09/24/2013) [-]
User avatar #9 to #7 - vexaton
Reply 0 123456789123345869
(09/24/2013) [-]
You ******* sicko! I thought this was happy!
User avatar #12 to #7 - niteghost
Reply +1 123456789123345869
(09/24/2013) [-]
This is the same way I saw it. I thought she was crying because they had broken up or he had died. Very nice rendtition.
User avatar #19 to #7 - notsureifanon
Reply +1 123456789123345869
(09/24/2013) [-]

**** you.
User avatar #17 - bothemastaofall
Reply 0 123456789123345869
(09/24/2013) [-]
I'd give her my private key
User avatar #11 - pureevil
Reply 0 123456789123345869
(09/24/2013) [-]
But if his key was public, why did she need his private one?
User avatar #13 to #11 - oshily
Reply 0 123456789123345869
(09/24/2013) [-]
#15 to #11 - anon id: 00a0dc9e
Reply 0 123456789123345869
(09/24/2013) [-]

Because the key pair is mathematically related, whatever is encrypted with a Public Key may only be decrypted by its corresponding Private Key and vice versa.

For example, if Bob wants to send sensitive data to Alice, and wants to be sure that only Alice may be able to read it, he will encrypt the data with Alice's Public Key. Only Alice has access to her corresponding Private Key and as a result is the only person with the capability of decrypting the encrypted data back into its original form.

As only Alice has access to her Private Key, it is possible that only Alice can decrypt the encrypted data. Even if someone else gains access to the encrypted data, it will remain confidential as they should not have access to Alice's Private Key.
User avatar #16 to #15 - therealtjthemedic
Reply 0 123456789123345869
(09/24/2013) [-]
wouldn't you be able to figure out the encryption using the public key?
#3 - fisterfight
0 123456789123345869
has deleted their comment [-]
#1 - anon id: 662cab54
Reply 0 123456789123345869
(09/24/2013) [-]
Unfortunately requires 1.) a girlfriend and 2.) a girlfriend with some advanced knowledge about computers and not this average farmville chicks. Two things in life I probably never get.
User avatar #2 to #1 - minorian
Reply 0 123456789123345869
(09/24/2013) [-]
also 3.) a girlfriend
#4 to #2 - fisterfight
Reply 0 123456789123345869
(09/24/2013) [-]
See 1.
See 1.
User avatar #5 to #4 - lordlolland
Reply 0 123456789123345869
(09/24/2013) [-]
No, the first one left because she didn't like her boyfriend being all cryptic and ****.
#6 to #5 - fisterfight
Reply 0 123456789123345869
(09/24/2013) [-]
Eh, fair enough.
Eh, fair enough.
User avatar #8 to #1 - captainfuckitall
Reply 0 123456789123345869
(09/24/2013) [-]
Not with that attitude
User avatar #18 to #1 - Sethorein
Reply 0 123456789123345869
(09/24/2013) [-]
date an engineering girl. Done.