How does public key cryptography operate?
, we can clearly see the importance of keeping the secret key secret. In practie, the secret key consists of a string of numbers store on a computer. To offer an extra level of protection, the secret key is protected using a pass phrase pretty much like a password. Whenever the secret key is used, the cryptographic software will prompt the user to enter the pass phrase. If the pass phrase is correct, the cryptographic operation continues. Otherwise, it will stop. Note that the pass phrase is called a “pass phrase” rather than a “password”. Historically, this term is used to encourage users to use long phrases (can include spaces in it) rather than using a short word.