Ask Science
Ask a science question, get a science answer.
Community Rules
Rule 1: Be respectful and inclusive.
Treat others with respect, and maintain a positive atmosphere.
Rule 2: No harassment, hate speech, bigotry, or trolling.
Avoid any form of harassment, hate speech, bigotry, or offensive behavior.
Rule 3: Engage in constructive discussions.
Contribute to meaningful and constructive discussions that enhance scientific understanding.
Rule 4: No AI-generated answers.
Strictly prohibit the use of AI-generated answers. Providing answers generated by AI systems is not allowed and may result in a ban.
Rule 5: Follow guidelines and moderators' instructions.
Adhere to community guidelines and comply with instructions given by moderators.
Rule 6: Use appropriate language and tone.
Communicate using suitable language and maintain a professional and respectful tone.
Rule 7: Report violations.
Report any violations of the community rules to the moderators for appropriate action.
Rule 8: Foster a continuous learning environment.
Encourage a continuous learning environment where members can share knowledge and engage in scientific discussions.
Rule 9: Source required for answers.
Provide credible sources for answers. Failure to include a source may result in the removal of the answer to ensure information reliability.
By adhering to these rules, we create a welcoming and informative environment where science-related questions receive accurate and credible answers. Thank you for your cooperation in making the Ask Science community a valuable resource for scientific knowledge.
We retain the discretion to modify the rules as we deem necessary.
view the rest of the comments
Isn't that for when you want to send a message to someone so only the recipient can read it?
If I understand correctly, OP is asking about signatures to prove the posted content comes from a specific source.
Anyway, thanks for the review!
https://en.m.wikipedia.org/wiki/Public-key_cryptography
Sorry, but I still think I'm saying the same thing as in that paragraph:
Look at the words you used, encryption is not the same as a signature, with a signature you can prove that a person with access to the private key wrote the message.
What you're talking about in your message is encryption, and you have it the wrong way around, messages gets encrypted with the public key, and can only be read with the private key.
We may be getting somewhere...
So they are not excrypting it, but do we agree that with signatures the author uses their private key + the clear message to generate "something"?
... so then anyone can use the author's public key to check that "something" against the clear mesage to confirm the author's identity?
If that's the case, then my error is that the operation to generate the signature is not an encryption. So, may I ask... what is it? A special type of hash?
Thanks again. I will edit my original comment with the corrections once I understand it correctly.
Yeah sure, and I think the person you are arguing with is saying as much as well, it's just that this is not encrypting it, when you encrypt something you obfuscate it in a way that is possible to deobfuscate, think the caesar cipher as a simple encryption, a hash/signature on the other hand is something that is generated from the clear text using your private key, which is not possible to decrypt, think very simplified that the person would just put the amount of each letter of the alphabet used in in the text, then add the length of the thread, and then multiplied by your private key. This way it's proven that the holder of the private key is the person writing the text, and that the text hasn't changed since the signature was generated.
They can confirm that the person holding the private key (not identity, just that they have the key) and also that nobody changed it since they signed it (like the person adminning the forum or a moderator or something)
It's basically a hashing function yeah.
Thanks, now it's clear.
I corrected my original comment.