...

/

Secure Communication using Public Key Cryptography

Secure Communication using Public Key Cryptography

In this lesson, we will see how two parties can communicate securely via public key cryptography.

Now that you understand the basic features of asymmetric key pairs, let’s see how this is used to ensure that two or more parties can communicate private messages on an open and insecure network.

Lets say Alice, Bob and Chris are connected ...