December 2017
Intermediate to advanced
410 pages
11h 5m
English
In the following diagram, we see that the sender has a document file that is being Encrypted by the Public Key and sent to the Receiver.
The receiver uses the corresponding Private Key to decrypt the document and gets the original data back:

Let's look into how we can make use of asymmetric key encryption for authenticating users.
Read now
Unlock full access