asymmetric encryption Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

list the steps to asymmetric encrryption

A
  • each person has their own private and public keys
  • both people exchange their public keys
  • the sender uses the recepients public key and their private key to encrypt the message
  • to decrypt the message the recepients private key and the senders public key will be used
How well did you know this?
1
Not at all
2
3
4
5
Perfectly