In cryptography we have a list of algorithms for encryption and decryption.This algorithm uses keys to encrypt/decrpt based on which there are two types of algorithm Symmetric key and Asymmetric key .Symmetric key uses same key for encryption and decryption but asymmetric key uses different key for encryption and decryption.In Asymmetric key we have 1 pair of key(Public key and private key) at both end ( source and destination).Now coming to public key and private key.
Public key-:public key is publically avaliable to both ends i.e sender and destination.
private key-:private key is present at each end specifically.
Let we have two station A and B.
CONTENTS OF A
public key of A |
private key of A |
Public key of B |
CONTENTS OF B
Public key of B |
Private key of B |
Public key of A |