January 2018
Intermediate to advanced
416 pages
10h 40m
English
“A colleague once told me that the world was full of bad security systems designed by people who read Applied Cryptography.”—Bruce Schneier, author of Applied Cryptography

In Chapter 23, you learned how public key cryptography works and how to generate public and private key files using the public key generation program. Now you’re ready to send your public key file to others (or post it online) so they can
use it to encrypt their messages before sending them to you. In this chapter, you’ll write the public key cipher program that encrypts and decrypts messages using the public and private keys you generated. ...