- 4
- 0
- 约2.35万字
- 约 52页
- 2016-04-16 发布于湖北
- 举报
10.7 Public Encryption In many encryption schemes, the key must be kept secret to avoid compromising security. One particularly interesting encryption technique assigns each user a pair of keys. One of the user’s keys, called the private key, is kept secret, while the other, called the public key, is published along with the name of the user, so everyone knows the value of the key. The encryption function has the mathematical property that a message encrypted with the public key cannot be easily decrypted except with the private key, and a message encrypted with the private key cannot be decry
原创力文档

文档评论(0)