Internet security for e3000 - September 2000

September 11, 2000
internet security on your hp e3000
Page 18
hp e3000
internet
security
Public
key
Original
text
Original
text
Cipher
text
Private
key
public key cryptography
Two keys are used. The two keys provide
inverse functions.
Private - Known only to the owner of the key
create digital signatures
create digital certificates
Public - Exposed to the world
included in digital certificate
Most well known public/private key
algorithm is RSA