You mention ports and encryption. What protocol are you talking about?
How the encryption key functions? To set up a connection, you use a key pair - you keep your private key, the other side gets your public key. And vice-versa. Data is encrypted with the public key and decrypted with the private key. Since this is CPU-intensive, the parties then exchange symmetric keys over the secure channel they created with the key pair. A new channel is set up, and the same key is used for encryption and decryption.
How does a transmitting node know the port that the other side uses? By convention, and/or it's hard-coded. Some protocols feature something like a port discovery, but for the first contact to the other party, you always need to know what port they use.
Can you share that site that you mention?
I don't understand the references to WEP and WPA, which are methods for making wireless connections secure, and I don't know what you mean by Brief explanation is OK or a http.
|