okay so you have a function f(m,k)->e, where m is the message, k is the key, and e is the encrypted message
they are all integers because computer
furthermore, the public key and private keys are inverses for f: f(a,b)=1, f(f(m,a),b)=m, f(f(m,b),a)=m
right?
okay making a key pair is pretty easy looks like
successfully signed a test file, encrypted, decrypted, imported a key, were good to go
my public key is at http://ianmhines.com/public-key if any of you crypt nerds want it
hmm there are these things called public key fingerprints which are hashes of a public key
these can supposedly be used to identify people?
but im not sure why these are any better than anything else, and i dont see any defense against ye olde ctrl+c ctrl+v