How can Alice ping and authenticate Bob without any of them sharing their public keyes beforehand

Both hosts have just their public and private key pair (but they do not have the other party’s public key).
Bob should be authenticated
Assume that the two hosts share clocks that are synced, i.e timestamps can be used.

I have not found … Continue reading How can Alice ping and authenticate Bob without any of them sharing their public keyes beforehand

In asymmetric encryption, is there a meaningful difference between the public and the private key?

Is it possible to swap them, so that the public key is kept secret while the private key is public? Or do they actually function differently?
Thinking specifically about DSA though I’m interested if there is a general answer.

Continue reading In asymmetric encryption, is there a meaningful difference between the public and the private key?

Create "bare" pgp private key / Make private key without being able to generate the public key from it

How do you create a private-key/public-key pair without the public key’s information in the private key? So you should basically not be able to extract the public key from the private key. The private key should contain the bare minimum.
I… Continue reading Create "bare" pgp private key / Make private key without being able to generate the public key from it