上QQ阅读APP看书,第一时间看更新
Asymmetric encryption
With asymmetric encryption, the main difference is that Alice would use a secret key to encrypt the message before sending it to Bob. When Bob receives the Ciphertext, he would use a different key to decrypt the message and read its contents:
In asymmetric encryption, two separate keys are used, one for the data encryption and another for the decryption. Therefore, if one of the keys is lost or stolen, the message is not compromised.