04.10.2013 Views

Smart Cards - CES

Smart Cards - CES

Smart Cards - CES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Public Key Cryptography<br />

Public key cryptography, also known as asymmetric<br />

cryptography, is based on the corresponding key<br />

pairs consisting of a pubic key and a private key.<br />

One key is used for encryption of data and the other<br />

for decryption.<br />

These two keys are mathematically related in such a<br />

way that the data encrypted by one key can be<br />

decrypted by the other.<br />

Folie 42

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!