When is a private and public key given to a user, and why can the private key not get hacked?

Trying to understand assymetric encryption. To my knowledge, it deals with the key management problem by having each user have their own private key and public key. But when is this private and public key pair generated for the user? Does … Continue reading When is a private and public key given to a user, and why can the private key not get hacked?

Why can SSH negotiatie two different encryption and authentication algorithms?

I recently found out, that according to the RFC, SSH can negotiate two different cipher (and MAC) algorithms for server-to-client-encryption and for client-to-server-encryption (check section 7.1. for reference).
In section 6.3 this is als… Continue reading Why can SSH negotiatie two different encryption and authentication algorithms?

Client-side encryption of data, but the server can also add data without reading stored data

For a new application I’d like to store messages for each user’s account on a centralized server.
The user accesses the application through a SPA javascript web app through their browser.
These messages:

Should be unreadable by the server… Continue reading Client-side encryption of data, but the server can also add data without reading stored data