Simple scenario of Symmetric and asymmetric cryptography
Home
/
Simple scenario of Symmetric and asymmetric cryptography
Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.
Alice wants to send a secret message to Bob. She encrypts the message using a secret key that she shares with Bob. Bob receives the encrypted message and uses the same secret key to decrypt it and read the original message.
Asymmetric cryptography scenario:
Alice wants to send a secure message to Bob. She retrieves Bob's public key and encrypts the message using that key. Bob receives the message and uses his private key to decrypt and read it. In this scenario, only Bob has access to his private key, so the encrypted message can only be decrypted by him.