16 IBM Business Process Manager Security: Concepts and Guidance
number of people can download the one public key, perform their encryption, and the key
holder only needs his one private key to decrypt.
If the sending party desires an encrypted response from the receiving party, then they too
must go through the process of generating a public+private key pair for themselves, and the
process is used in reverse.
If there is going to be a great deal of communication between these two parties, then the
computational overhead of asymmetric encryption can become an issue. What we need is a
way to leverage asymmetric encryption’s ease of logistics with symmetric encryption’s speed.
Enter the handshake.
1.3.3 SSL and digital certificates
When we endea ...