Encryption Public-Key (Asymmetric)
Ted
Bob
Alice
Carol’s Public Key
Carol’s Public Key
Carol’s Public Key
Carol decrypts these
messages using her
private key
Previous slide
Next slide
Back to first slide
View graphic version