This graphic illustrates the steps in public key encryption. The sender encrypts data using the public key of the recipient; data encrypted with this public key can only be decrypted with the recipient’s private key.
This graphic illustrates the steps in public key encryption. The sender encrypts data using the public key of the recipient; data encrypted with this public key can only be decrypted with the recipient’s private key.