PPT Slide
Alice gets Bob’s
Public Key from certificate repository
Sends to Bob
Bob decrypts using his Private Key
Obtains Bob’s Public Key
Encrypts transmission
using Bob’s Public Key
UNCLASSIFIED
UNCLASSIFIED
Previous slide
Next slide
Back to first slide
View graphic version