Public key encryption
Unlike ‘secret-key encryption’, ‘public key encryption’ has two keys that are mathematically related. These key pairs can be used either to provide privacy or authentication. As the name suggests, the secret-key is kept a closely guarded secret by the owner and the public-key is freely circulated. This technique is referred to as RSA (Rivet, Shamir, … Read more