Computer Science, asked by sneetu8834, 1 year ago

Public key cryptosystem secrecy and authentication

Answers

Answered by rupali1717
0
It is computationally infeasible to determine the decryptionkey given only knowledge of the cryptographic algorithm and the encryption key. In this case, separate key pairs are used for each of these purposes. The receiver owns and creates secrecy keys, sender owns and createsauthentication keys.
Similar questions