Revolution in Security
Public key systems use two keys: one to encrypt, another to decrypt. This solved the key distribution problem.
RSA and elliptic curve cryptography make secure internet communication possible.
Public key systems use two keys: one to encrypt, another to decrypt. This solved the key distribution problem.
RSA and elliptic curve cryptography make secure internet communication possible.