retagged by
635 views

1 Answer

0 votes
0 votes

In cryptography  we have a list of  algorithms for encryption and decryption.This algorithm uses keys to encrypt/decrpt based on which there are two types of algorithm Symmetric key and Asymmetric key .Symmetric key uses same key for encryption and decryption but asymmetric key uses different key for encryption and decryption.In Asymmetric  key we have  1 pair of key(Public key and private key) at both end ( source and destination).Now coming to public key and private key.

Public key-:public key is publically avaliable to both ends i.e sender and destination.

private key-:private key is present at each end specifically.

Let we have two station A and B.

CONTENTS OF  A
public key of A
private key of A
Public key of B
CONTENTS OF B
Public key of B
Private key of B
Public key of A
edited by

Related questions

0 votes
0 votes
1 answer
1
Shivangi Parashar 2 asked Oct 12, 2018
1,246 views
Using RSA key crypto system with a = 1, b = 2 etc; value for encryption if prime value are p = 7 and q = 11, the legal value for secret key is .a)69b)49c)49d)119
0 votes
0 votes
1 answer
3
0 votes
0 votes
1 answer
4