Slide 1 Slide 2 Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Slide 8 Slide 9 Slide 10 Slide 11 Slide 12 Slide 13 Slide 14 Product List
Cryptographic-Pt1-Slide7

Contrary to the symmetric-key encryption, public-key encryption uses a pair of keys: a public key, which encrypts data, and its corresponding private key for decryption. Because it uses two keys, it is sometimes called asymmetric cryptography. It is computationally infeasible to deduce the private key from the public key. Anyone who has a public key can encrypt information but cannot decipher it, only the person who has the corresponding private key can decipher the information.

PTM Published on: 2012-01-09