Encryption Public-Key (Asymmetric)
Carol, Ted, Bob, and Alice post their public keys and
keep their private keys secret
Previous slide
Next slide
Back to first slide
View graphic version