04.05.2015 Views

Public Key Infrastructure (PKI) and Its ... - Dematerialised ID

Public Key Infrastructure (PKI) and Its ... - Dematerialised ID

Public Key Infrastructure (PKI) and Its ... - Dematerialised ID

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Confidentiality<br />

Provided by Encryption<br />

One <strong>Key</strong><br />

Conventional<br />

(Symmetric)<br />

Used for both<br />

Encryption <strong>and</strong> Decryption<br />

Must be protected, kept private<br />

Secure distribution a challenge<br />

Two <strong>Key</strong>s<br />

<strong>Public</strong> <strong>Key</strong><br />

(Asymmetric)<br />

Mathematically related<br />

One key used for encryption,<br />

may be made public<br />

One key used for decryption,<br />

must be protected, kept private<br />

September 13, 1999 5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!