Authentication with public key Cryptography
Here A chooses a challenge -- a random number r and can verify that B is at other end using solely public information!
Alice is A
Bob is B
Previous slide
Next slide
Back to first slide
View graphic version