With the example of Alice and Bob in your session, what is the use of Alice's public and private key, if she uses bob's public key to encrypt.
And how she Know's Bob's Public key.
Thanks for your help!
Comments
Please login to comment.
With the example of Alice and Bob in your session, what is the use of Alice's public and private key, if she uses bob's public key to encrypt.
And how she Know's Bob's Public key.
Thanks for your help!