Public key cryptosystem secrecy and authentication
Answers
Answered by
0
It is computationally infeasible to determine the decryptionkey given only knowledge of the cryptographic algorithm and the encryption key. In this case, separate key pairs are used for each of these purposes. The receiver owns and creates secrecy keys, sender owns and createsauthentication keys.
Similar questions