Category: Uncategorized
-
Asymmetric Cryptography
Allows for secure communication without having to agree on a secret key or code to encrypt and decrypt messages. Alice and Bob are always used as the two people communicating in these scenarios Both have 2 keys – a PRIVATE and a PUBLIC key. The private key is a random number. In bitcoin, the private…