Secure Communication using Public Key Cryptography
In this lesson, we will see how two parties can communicate securely via public key cryptography.
We'll cover the following
Now that you understand the basic features of asymmetric key pairs, let’s see how this is used to ensure that two or more parties can communicate private messages on an open and insecure network.
Lets say Alice, Bob and Chris are connected through a network on which everyone can read data being transferred. If Alice was to send a secret message to Bob only, it would not be possible as Chris gets to read everything transmitted through the network.
Get hands-on with 1200+ tech skills courses.