In this study we try to explore the concept of Public Key Exchanges in a holistic context. The research also analyzes steps of Public Key Exchanges and how it manages a transaction.
TABLE OF CONTENTS
Abstract2
Introduction4
Bases4
Advantages and Disadvantages of Asymmetric Encryption5
Conclusion5
References7
Public Key Exchanges
Introduction
The 'asymmetric cryptography' is the method of cryptography that uses two keys for sending messages. The two keys belong to the same person who sent the message. One key is public and can be delivered to any person, the other key is private and the owner must keep it so no one has access to it. In ...