Public Key Infrastructure (PKI) and Its ... - Dematerialised ID
Public Key Infrastructure (PKI) and Its ... - Dematerialised ID
Public Key Infrastructure (PKI) and Its ... - Dematerialised ID
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Confidentiality<br />
Provided by Encryption<br />
One <strong>Key</strong><br />
Conventional<br />
(Symmetric)<br />
Used for both<br />
Encryption <strong>and</strong> Decryption<br />
Must be protected, kept private<br />
Secure distribution a challenge<br />
Two <strong>Key</strong>s<br />
<strong>Public</strong> <strong>Key</strong><br />
(Asymmetric)<br />
Mathematically related<br />
One key used for encryption,<br />
may be made public<br />
One key used for decryption,<br />
must be protected, kept private<br />
September 13, 1999 5