Each party in the communication should have its own key pair and have their Public Keys shared. The keys are sequences of bytes generated together and are mathematically linked, they are also called “Key Pair”. This method is also known as Public-key cryptography. As the name implies one can be shared publicly and the other should be kept secret. Add illustration for Asymmetric Encryption - Similar to this and this.Īdd illustration for digital signature - Similar to this and this and thisĮxplain the SSL Handshake - Similar to thisĪdd appendix using requests to show self-signed warnings.Īsymmetric encryption does not have passwords or keys like symmetric but rather it splits the security into a pair of keys, one used to encrypt (usually called Public Key) and another used to decrypt (usually call Private Key).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |