Public Key Cryptography (2)
Asymmetric (public-key) Cryptography
adding Confidentiality; 2 keys mathematically linked: public and private keys (RSA, DH)
either can be used for encryption /decryption
problem: computationally intensive
Recipient’s
Public Key
Cleartext
message
Cleartext
message
Encrypt
Decrypt
Recipient’s
Private key
Previous slide
Next slide
Back to first slide
View graphic version