Shrestha Rajat

Search

Search IconIcon to open search

Last updated Jul 9, 2023 Edit Source

# Asymmetric Encryption

#cyber-security #security #encryption

Also known as public key cryptography where messages are Encrypted with the public key can only be Decrypted with the private key. the Private key can also sign the document to prove the authenticity of the creator.

SSL/TLS and SSH uses this technique to securely transmit data.