Beruflich Dokumente
Kultur Dokumente
Another user can encrypt the data using users A’s Public Key.
User A will use the Private Key to decrypt the message. Without
user A’s Private Key the data can not be decrypted. The above
figure depicts the encryption method and decryption method and
which keys are used.
CRYPTOGRAP
HY
• Encryption and authentication take
place without any sharing of
private keys: each person uses
only another's public key or their
own private key. Anyone can send
an encrypted message or verify a
signed message, but only
someone in possession of the
correct private key can decrypt or
sign a message.
•
CRYPTOGRAPHY