|
Post by iOri YagAmi on Feb 17, 2016 7:11:09 GMT
Public key cryptography (Asymmetric cryptography) uses two keys -- one is called the public key and the other the private key. The public key and corresponding private key are mathematically related. When you want to send Alice a message using public key cryptography, you obtain Alice's public key and use it to encrypt the message. You then send her the resulting cipher text. Alice, uses her private key to decrypt the cipher text you sent her.
Private key cryptography (symmetric cryptography) uses a single key. If you want to send Alice a message using private key cryptography you encrypt the message with a private key (that Alice and you (but not anyone who you don't want to read the message) both have access to) and send her the cipher text. Alice uses the same private key that was used to encrypt the message to decipher the message on her side.
|
|
|
Post by cryptography on Feb 17, 2016 10:53:00 GMT
Public key cryptography (Asymmetric cryptography) uses two keys -- one is called the public key and the other the private key. The public key and corresponding private key are mathematically related. When you want to send Alice a message using public key cryptography, you obtain Alice's public key and use it to encrypt the message. You then send her the resulting cipher text. Alice, uses her private key to decrypt the cipher text you sent her. cryptography techniques
|
|