First page Back Continue Last page Image

Asymmetric Key Example

Person A

Person B

Each Person can now use the other persons public key to Encrypt a message for them

Only the private key (which was never sent across the network) can Decrypt

My readable message to person B

The readable message from person A

Bad Hacker