Download presentation
Presentation is loading. Please wait.
Published byVidar Egeland Modified over 5 years ago
1
Purpose: how do computers keep our information secret?
2
Take 10 minutes to mark up your article
Take 10 minutes to mark up your article. When finished you will be asked to either support or criticize Edward Snowdon.
3
If I could go back in time I would tell Edward snowdon: do it! Don’t!
4
In Public Key encryption:
Anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. A large and random number is used to begin generation of an acceptable pair of keys.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.