210 likes | 424 Views
2. Public Key Cryptography. Two keysPrivate key known only to ownerPublic key available to anyoneIdeaConfidentiality: encipher using public key, decipher using private key (only the owner can decipher it)Integrity/authentication: encipher using private key, decipher using public one (only the o
E N D