![]() ![]() The videos cover two families of public key encryption systems: one based on trapdoor functions (RSA in particular) and the other based on the Diffie-Hellman protocol. Public key encryption is used for key management in encrypted file systems, in encrypted messaging systems, and for many other tasks. ![]() This week's topic is public key encryption: how to encrypt using a public key and decrypt using a secret key. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |