First page
Back
Continue
Last page
Image
Asymmetric Key Example
Person A
Person B
Each Person starts with 2 Related Keys
One is Private
One is Public
The public keys are cloned and distributed to everyone
Bad Hacker