参考https://engineering.purdue.edu/kak/compsec/NewLectures/Lecture12.pdf
• Public-key cryptography is also known as asymmetric-key cryptography,
to distinguish it from the symmetric-key cryptography
we have studied thus far.
• Encryption and decryption are carried out using two different
keys. The two keys in such a key pair are referred to as the
public key and the private key.
两者都有
网友评论