DEV Community

Sreekar Reddy
Sreekar Reddy

Posted on • Originally published at sreekarreddy.com

πŸ—οΈ Public/Private Keys Explained Like You're 5

Mailbox others can drop into, opened with your key

Day 90 of 149

πŸ‘‰ Full deep-dive with code examples


The Mailbox Analogy

Imagine a special mailbox in front of your house:

  • People can drop letters through the slot (public key)
  • You use the key to open and read them (private key)

Even if attackers intercept the letters, they generally still can’t read them without the private key.


How It Works

ENCRYPTION:
Bob wants to send Alice a secret message

1. Alice shares her PUBLIC key (others can have it)
2. Bob encrypts message with Alice's public key
3. Alice's PRIVATE key is used to decrypt it
4. Attackers usually can't decrypt it without the private key
Enter fullscreen mode Exit fullscreen mode

The Magic

Public key encrypts β†’ Private key decrypts

Encrypt("Hello", Alice's_Public_Key) β†’ "x7$k2!m@"

Decrypt("x7$k2!m@", Alice's_Private_Key) β†’ "Hello"
Decrypt("x7$k2!m@", Anyone_Else's_Key) β†’ πŸ’₯ Fails
Enter fullscreen mode Exit fullscreen mode

Real Uses

Use How It Works
HTTPS Browser uses server's public key
SSH Your public key on servers, private on laptop
Email signing Sign with private, verify with public
Crypto wallets Private key = access to funds

The Golden Rule

Keep your private key secret.

Public key: Share as needed
Private key: Guard it carefully


In One Sentence

Public/private keys let others encrypt messages to you, and your private key is used to decrypt them.


πŸ”— Enjoying these? Follow for daily ELI5 explanations!

Making complex tech concepts simple, one day at a time.

Top comments (1)

Collapse
 
sanjayghosh profile image
Sanjay Ghosh

Very concise and usefulβ€”thanks for sharing!