asymmetric encryption Flashcards
1
Q
list the steps to asymmetric encrryption
A
- each person has their own private and public keys
- both people exchange their public keys
- the sender uses the recepients public key and their private key to encrypt the message
- to decrypt the message the recepients private key and the senders public key will be used