| Public Key Encryption | |
- A wants to send a private mesage to B
- A has B's public key (so do lots of other people)
- A encrypts message using B's public key
- B is only person who can decrypt the message using his private key
Slide 59 | ©Copyright 1997 | Jan Newmarch |