Internet security for e3000 - September 2000
September 11, 2000
internet security on your hp e3000
Page 18
hp e3000
internet
security
Public
key
Original
text
Original
text
Cipher
text
Private
key
public key cryptography
• Two keys are used. The two keys provide
inverse functions.
• Private - Known only to the owner of the key
• create digital signatures
• create digital certificates
• Public - Exposed to the world
• included in digital certificate
• Most well known public/private key
algorithm is RSA