Authenticate with a private key

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP











up vote
0
down vote

favorite
1












Is it possible to authenticate myself with the private key at the public key?



The scenario: I gave another company the public key so that I can authenticate myself with my private key at the sftp server.



Is this "backwards asymmetric encryption" possible?
If not, can someone explain why?










share|improve this question



















  • 3




    "I gave another company the public key so I can authenticate myself with my private key at the sftp server" - That's how it works.
    – Martin Prikryl
    Nov 28 at 16:10















up vote
0
down vote

favorite
1












Is it possible to authenticate myself with the private key at the public key?



The scenario: I gave another company the public key so that I can authenticate myself with my private key at the sftp server.



Is this "backwards asymmetric encryption" possible?
If not, can someone explain why?










share|improve this question



















  • 3




    "I gave another company the public key so I can authenticate myself with my private key at the sftp server" - That's how it works.
    – Martin Prikryl
    Nov 28 at 16:10













up vote
0
down vote

favorite
1









up vote
0
down vote

favorite
1






1





Is it possible to authenticate myself with the private key at the public key?



The scenario: I gave another company the public key so that I can authenticate myself with my private key at the sftp server.



Is this "backwards asymmetric encryption" possible?
If not, can someone explain why?










share|improve this question















Is it possible to authenticate myself with the private key at the public key?



The scenario: I gave another company the public key so that I can authenticate myself with my private key at the sftp server.



Is this "backwards asymmetric encryption" possible?
If not, can someone explain why?







linux ssh sftp key-authentication






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited Nov 28 at 16:45









Jeff Schaller

37.2k1052121




37.2k1052121










asked Nov 28 at 16:00









Can Lotoz

31




31







  • 3




    "I gave another company the public key so I can authenticate myself with my private key at the sftp server" - That's how it works.
    – Martin Prikryl
    Nov 28 at 16:10













  • 3




    "I gave another company the public key so I can authenticate myself with my private key at the sftp server" - That's how it works.
    – Martin Prikryl
    Nov 28 at 16:10








3




3




"I gave another company the public key so I can authenticate myself with my private key at the sftp server" - That's how it works.
– Martin Prikryl
Nov 28 at 16:10





"I gave another company the public key so I can authenticate myself with my private key at the sftp server" - That's how it works.
– Martin Prikryl
Nov 28 at 16:10











2 Answers
2






active

oldest

votes

















up vote
0
down vote



accepted










You always put the public key on the remote server you want to login to. The private key is meant to remain private to you.



So, with ssh, you put the public key into the authorized_keys file on the server you want to login to (or have the admin do it, if you don't have the ability yourself).



Now you can use the private key to access that remote server.



In general, you shouldn't give your private key to anyone; that's why it's called private.






share|improve this answer



























    up vote
    0
    down vote













    Generalized and Simplified Public Key Authentication



    Asymmetric key pairs used for authentication are mathematically designed so as to be difficult to compute the private key using the public key. This means one can effectively distribute the public key to anyone. The private key is used to generate a cryptographic token by the client which is verified using the public key on the server.



    Since the whole point of authentication is to ensure that the entity attempting to be authenticated is the owner of the private key, the question is really moot.






    share|improve this answer




















      Your Answer








      StackExchange.ready(function()
      var channelOptions =
      tags: "".split(" "),
      id: "106"
      ;
      initTagRenderer("".split(" "), "".split(" "), channelOptions);

      StackExchange.using("externalEditor", function()
      // Have to fire editor after snippets, if snippets enabled
      if (StackExchange.settings.snippets.snippetsEnabled)
      StackExchange.using("snippets", function()
      createEditor();
      );

      else
      createEditor();

      );

      function createEditor()
      StackExchange.prepareEditor(
      heartbeatType: 'answer',
      convertImagesToLinks: false,
      noModals: true,
      showLowRepImageUploadWarning: true,
      reputationToPostImages: null,
      bindNavPrevention: true,
      postfix: "",
      imageUploader:
      brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
      contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
      allowUrls: true
      ,
      onDemand: true,
      discardSelector: ".discard-answer"
      ,immediatelyShowMarkdownHelp:true
      );



      );













      draft saved

      draft discarded


















      StackExchange.ready(
      function ()
      StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f484703%2fauthenticate-with-a-private-key%23new-answer', 'question_page');

      );

      Post as a guest















      Required, but never shown

























      2 Answers
      2






      active

      oldest

      votes








      2 Answers
      2






      active

      oldest

      votes









      active

      oldest

      votes






      active

      oldest

      votes








      up vote
      0
      down vote



      accepted










      You always put the public key on the remote server you want to login to. The private key is meant to remain private to you.



      So, with ssh, you put the public key into the authorized_keys file on the server you want to login to (or have the admin do it, if you don't have the ability yourself).



      Now you can use the private key to access that remote server.



      In general, you shouldn't give your private key to anyone; that's why it's called private.






      share|improve this answer
























        up vote
        0
        down vote



        accepted










        You always put the public key on the remote server you want to login to. The private key is meant to remain private to you.



        So, with ssh, you put the public key into the authorized_keys file on the server you want to login to (or have the admin do it, if you don't have the ability yourself).



        Now you can use the private key to access that remote server.



        In general, you shouldn't give your private key to anyone; that's why it's called private.






        share|improve this answer






















          up vote
          0
          down vote



          accepted







          up vote
          0
          down vote



          accepted






          You always put the public key on the remote server you want to login to. The private key is meant to remain private to you.



          So, with ssh, you put the public key into the authorized_keys file on the server you want to login to (or have the admin do it, if you don't have the ability yourself).



          Now you can use the private key to access that remote server.



          In general, you shouldn't give your private key to anyone; that's why it's called private.






          share|improve this answer












          You always put the public key on the remote server you want to login to. The private key is meant to remain private to you.



          So, with ssh, you put the public key into the authorized_keys file on the server you want to login to (or have the admin do it, if you don't have the ability yourself).



          Now you can use the private key to access that remote server.



          In general, you shouldn't give your private key to anyone; that's why it's called private.







          share|improve this answer












          share|improve this answer



          share|improve this answer










          answered Nov 28 at 16:35









          Stephen Harris

          23.4k24376




          23.4k24376






















              up vote
              0
              down vote













              Generalized and Simplified Public Key Authentication



              Asymmetric key pairs used for authentication are mathematically designed so as to be difficult to compute the private key using the public key. This means one can effectively distribute the public key to anyone. The private key is used to generate a cryptographic token by the client which is verified using the public key on the server.



              Since the whole point of authentication is to ensure that the entity attempting to be authenticated is the owner of the private key, the question is really moot.






              share|improve this answer
























                up vote
                0
                down vote













                Generalized and Simplified Public Key Authentication



                Asymmetric key pairs used for authentication are mathematically designed so as to be difficult to compute the private key using the public key. This means one can effectively distribute the public key to anyone. The private key is used to generate a cryptographic token by the client which is verified using the public key on the server.



                Since the whole point of authentication is to ensure that the entity attempting to be authenticated is the owner of the private key, the question is really moot.






                share|improve this answer






















                  up vote
                  0
                  down vote










                  up vote
                  0
                  down vote









                  Generalized and Simplified Public Key Authentication



                  Asymmetric key pairs used for authentication are mathematically designed so as to be difficult to compute the private key using the public key. This means one can effectively distribute the public key to anyone. The private key is used to generate a cryptographic token by the client which is verified using the public key on the server.



                  Since the whole point of authentication is to ensure that the entity attempting to be authenticated is the owner of the private key, the question is really moot.






                  share|improve this answer












                  Generalized and Simplified Public Key Authentication



                  Asymmetric key pairs used for authentication are mathematically designed so as to be difficult to compute the private key using the public key. This means one can effectively distribute the public key to anyone. The private key is used to generate a cryptographic token by the client which is verified using the public key on the server.



                  Since the whole point of authentication is to ensure that the entity attempting to be authenticated is the owner of the private key, the question is really moot.







                  share|improve this answer












                  share|improve this answer



                  share|improve this answer










                  answered Nov 28 at 16:49









                  RubberStamp

                  1,7301518




                  1,7301518



























                      draft saved

                      draft discarded
















































                      Thanks for contributing an answer to Unix & Linux Stack Exchange!


                      • Please be sure to answer the question. Provide details and share your research!

                      But avoid


                      • Asking for help, clarification, or responding to other answers.

                      • Making statements based on opinion; back them up with references or personal experience.

                      To learn more, see our tips on writing great answers.





                      Some of your past answers have not been well-received, and you're in danger of being blocked from answering.


                      Please pay close attention to the following guidance:


                      • Please be sure to answer the question. Provide details and share your research!

                      But avoid


                      • Asking for help, clarification, or responding to other answers.

                      • Making statements based on opinion; back them up with references or personal experience.

                      To learn more, see our tips on writing great answers.




                      draft saved


                      draft discarded














                      StackExchange.ready(
                      function ()
                      StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f484703%2fauthenticate-with-a-private-key%23new-answer', 'question_page');

                      );

                      Post as a guest















                      Required, but never shown





















































                      Required, but never shown














                      Required, but never shown












                      Required, but never shown







                      Required, but never shown

































                      Required, but never shown














                      Required, but never shown












                      Required, but never shown







                      Required, but never shown






                      Popular posts from this blog

                      How to check contact read email or not when send email to Individual?

                      Displaying single band from multi-band raster using QGIS

                      How many registers does an x86_64 CPU actually have?