Public/Private-key Cryptography
Also called Asymmetric Cryptography
2 keys are required to encrypt and decrypt a document
Each partner generates a key pair - one private key and one public key
Partners publish and exchange public keys
Private keys remain secret
Author | Title | Tracks | Home