Public-key cryptography: Difference between revisions

Content deleted Content added
Undid revision 1300182010 by 175.100.6.27 (talk)
No edit summary
Tags: Reverted Mobile edit Mobile web edit
Line 4:
 
[[File:Public-key-crypto-1.svg|thumb|250px|right|An unpredictable (typically large and [[random]]) number is used to begin generation of an acceptable pair of [[cryptographic key|keys]] suitable for use by an asymmetric key algorithm.]]
[[File:Private key signing.svg|thumb|250px|In this example the message is [[digital signature|digitally signed]] with Alice's private key, but the message itself is not encrypted.
1) Alice signs a message with her private key.
2) Using Alice's public key, Bob can verify that Alice sent the message and that the message has not been modified.]]