@biar
Asymmetric Encryption
This method involves two keys:
•a public key (open to everyone), and
•a private/secret key (known only by the owner).
Let’s say person A wants to exchange information with person B.
•A has a private key that only they know.
•A also has a public key that everyone, including A, knows.
Here’s one approach:
•A encrypts their message using their private key and sends it to B.
•Since B does not have A’s private key, they use A’s public key to decrypt it.