Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Probably because the analogy breaks down so fast.

"And to prove he sent the package, he locks it with his key and then you use your copy of his lock to open it so that you know it's from him!"

It's a useful analogy for one specific use of public/private keys. But it doesn't capture the full spirit, which may lead to more confusion than just using no analogy.



It's not true in general that public-key encryption and digital signatures are inverse operations. (RSA has that property, but there are plenty of other algorithms that don't work that way.)

If you're writing for a lay audience that doesn't care about things like modular arithmetic, there's no reason to conflate the two operations. Just say encryption is like keys and locks, and signing is like... well... a signature.


So this public key is like a lock and that public key is not like a lock. Got it.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: