Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Public key Encryption



Public Key Encryption: -

1.) Public key encryption algorithms are based on mathematical functions.
2.) Public key encryption is asymmetric.
3.) The sender has one key and the receiver has other key from the pair of the keys.
4.) One key from the pair of the keys must be       kept secret.
5.) One algorithm is used with two keys- one key for encryption and other key for decryption.
6.) Knowledge of algorithm plus samples of cipher text plus one key from the pair of the keys must be insufficient to determine the other key.


This post first appeared on BCA MCA NOTES, please read the originial post: here

Share the post

Public key Encryption

×

Subscribe to Bca Mca Notes

Get updates delivered right to your inbox!

Thank you for your subscription

×