Approach
Public-key encryption (also called asymmetric encryption) involves a pair of keys—a public key and a private key—associated with an entity that needs to authenticate its identity electronically or to sign or encrypt data. Each public key is published, and the corresponding private key is kept secret.[1]
Public Key : ENCRIPTION
Private Key : DECRIPTION
PUBLIC KEY | PRIVATE KEY |
PK001 | PR001 |
PK002 | PR002 |
PK003 | PR003 |
… | … |
Algorithm
RSA contains the following elements
1. Key Generation Algorithm
2. Encription
3. Decryption
4. Digital signing
5. Signature verification
Reference
[1] http://download.oracle.com/docs/cd/E19424-01/820-4811/gbesy/index.html
[2] http://en.wikipedia.org/wiki/RSA
Leave a comment