Asymmetric Encryption

  • Stephen Haunts


In Chapter  6, we looked at symmetric encryption, which is a two-way encryption process that uses the same key for both encryption and decryption of your message. In this chapter we will continue our look at encryption by covering asymmetric encryption with RSA.

Copyright information

© Stephen Haunts 2019

Authors and Affiliations

  • Stephen Haunts
    • 1
  1. 1.BelperUK

Personalised recommendations