First page Back Continue Last page Graphics
The Basic Steps
Each user generates a pair of keys
The public key goes in a public register
The private key is kept private
If Bob wishes to send a private message to Alice, Bob encrypts the message using Alice’s public key
When Alice receives the message, she decrypts using her private key