How can Alice ping and authenticate Bob without any of them sharing their public keyes beforehand

Both hosts have just their public and private key pair (but they do not have the other party’s public key).
Bob should be authenticated
Assume that the two hosts share clocks that are synced, i.e timestamps can be used.

I have not found … Continue reading How can Alice ping and authenticate Bob without any of them sharing their public keyes beforehand

In asymmetric encryption, is there a meaningful difference between the public and the private key?

Is it possible to swap them, so that the public key is kept secret while the private key is public? Or do they actually function differently?
Thinking specifically about DSA though I’m interested if there is a general answer.

Continue reading In asymmetric encryption, is there a meaningful difference between the public and the private key?

Create "bare" pgp private key / Make private key without being able to generate the public key from it

How do you create a private-key/public-key pair without the public key’s information in the private key? So you should basically not be able to extract the public key from the private key. The private key should contain the bare minimum.
I… Continue reading Create "bare" pgp private key / Make private key without being able to generate the public key from it

Does the the key used to encrypt in a ransomware attack reside on the target computer for at least some time? [duplicate]

My understanding is that a ransomware uses the target computer’s resources to encrypt files. So does that mean that the key used for encryption resides on the target computer for at least some time? I am assuming that symmetric encryption … Continue reading Does the the key used to encrypt in a ransomware attack reside on the target computer for at least some time? [duplicate]