ขนาดวิดีโอ: 1280 X 720853 X 480640 X 360
แสดงแผงควบคุมโปรแกรมเล่น
เล่นอัตโนมัติ
เล่นใหม่
2:25 is symmetric key still encrypted by Bob's public key?
How can Bob decrypt the hash using Alice's public key, if public key is used to encrypt?
Alice uses her private key to encrypt the hash, see 2:10. This allows Bob to decrypt it using her public key. I could be wrong, but this is how it's presented in the CBK.
Very nice. I think that it could be of use to research a service such as S M Z E U S!
2:25 is symmetric key still encrypted by Bob's public key?
How can Bob decrypt the hash using Alice's public key, if public key is used to encrypt?
Alice uses her private key to encrypt the hash, see 2:10. This allows Bob to decrypt it using her public key. I could be wrong, but this is how it's presented in the CBK.
Very nice. I think that it could be of use to research a service such as S M Z E U S!