The computer to send encrypted data to send using the secret key (double the key), then the primary secret key encryption (double key) by using the recipient's public key (public key). The receiving computer uses its own key (private key) to correspond with the key public key to decrypt the secret key (double the key), then use this secret key to decrypt the dataPublic-key encryption systems use a combination of public key and the private key to perform encryption, decryption. The private key is only used in that computer, while the public key is transmitted to the other computer that it want to Exchange security information. To decrypt the encrypted data, the other computer must use the public key and private key, getting itself. A publicly available encryption software are Pretty Good Privacy (PGP) encryption lets you witnessed * almost anything.The following are two examples of application security using encryption techniques:
đang được dịch, vui lòng đợi..