Biar pfp
Biar

@biar

Asymmetric Encryption ‎This method involves two keys: ‎•a public key (open to everyone), and ‎•a private/secret key (known only by the owner). ‎Let’s say person A wants to exchange information with person B. ‎•A has a private key that only they know. ‎•A also has a public key that everyone, including A, knows. ‎Here’s one approach: ‎•A encrypts their message using their private key and sends it to B. ‎•Since B does not have A’s private key, they use A’s public key to decrypt it.
1 reply
0 recast
0 reaction