First page Back Continue Last page Summary Graphics
Response | Technology contd
Cryptography contd
- Public-key encryption
- Uses key pairs (math-related)
- Public portion published
- Private portion kept secret
- Doesnt require senders and receivers to exchange keys first
- Much slower than private-key
- Example
- Authenticates the sender
- Only the sender knows secret key corresponding to senders public key
- Ensures confidentiality
- Only intended receiver knows secret key corresponding to receivers public key
- Note: Message digests more efficient