First page Back Continue Last page Image

Asymmetric Key Example

Person A

Person B

Each Person starts with 2 Related Keys

One is Private

One is Public

The public keys are cloned and distributed to everyone

Bad Hacker