First page Back Continue Last page Image

Asymmetric Key Example

Person A

Person B

To transmit in the opposite direction you would use the other key set

Our Bad Hacker does not have either decryption key

My readable message to person A

The readable message from person B

Bad Hacker