Asymmetric Cryptography -- Use Cases

Page #463 of Chapter:

Watch in full screen, if you like

level indicator

****

The innovation to use different keys for encryption and for decryption is the underlying principle that enables cyber-life as we know it. It is how we identify people online, it is how we authenticate messages from the Internet, and it is how we sign contracts, and make commitments over a distance.

* Version CE-H6703 (SERVER) Crypto Academy