Just another tech site

3. Public Key Algorithm


Approach

Public-key encryption (also called asymmetric encryption) involves a pair of keys—a public key and a private key—associated with an entity that needs to authenticate its identity electronically or to sign or encrypt data. Each public key is published, and the corresponding private key is kept secret.[1]

Public Key : ENCRIPTION
Private Key : DECRIPTION

PUBLIC KEY PRIVATE KEY
PK001 PR001
PK002 PR002
PK003 PR003

Algorithm

RSA contains the following elements

1. Key Generation Algorithm
2. Encription
3. Decryption
4. Digital signing
5. Signature verification

Reference

[1] http://download.oracle.com/docs/cd/E19424-01/820-4811/gbesy/index.html
[2] http://en.wikipedia.org/wiki/RSA

Leave a comment