First page
Back
Continue
Last page
Image
Asymmetric Key Example
Person A
Person B
To transmit in the opposite direction you would use the other key set
Our Bad Hacker does not have either decryption key
My readable message to person A
The readable message from person B
Bad Hacker