Cryptography
Jump to navigation
Jump to search
Encryption protocols
Symmetric | Asymmetric |
---|---|
|
|
. System-1 System-2 #Encryption decryption download [data encrypted] -----> [data decrypted] - with public2 key - with private2 key #Signing [data encrypted] -----> [data decrypted] - with public2 key - with private2 key - signed with private1 key - verified signature with public1 key #Note, where needed the public key exchange happen, eg. via CA distribution process or protocol initialisation etc.