Network Security Essentials — Notes4. Public-key Cryptography
1. Public-key Cryptography The schem uses two keys, if one is for encryption, then the other is for decryption. "Truly revolutionary advance in cryptography" "Profound concequences in the areas of Confidentiality, key distrituion and Message Authentication" 2.Six Integriends a.Plaintext b.Encryption Algorithm (Not Secret) c.Public Key (Not Secret) d.Private …
Network Security Essentials — Notes4. Public-key Cryptography Read More »