Back

Cryptography

Created 1 year ago
58 Views
1 Comments
Thiyagarajan2XF0HP
@Thiyagarajan2XF0HP
Thiyagarajan2XF0HP
@Thiyagarajan2XF0HPProfile is locked. Login

With the example of Alice and Bob in your session, what is the use of Alice's public and private key, if she uses bob's public key to encrypt.

And how she Know's Bob's Public key.

Thanks for your help!

Comments
Please login to comment.