Web Application Security
Back to list
Name:
Email:
*Note: Email address will appear as "user domain ext" to prevent harvesting.
Subject:
Message:
RE: Secret Sharing
Aug 03 2013 08:42PM
JAntonakos excelsior edu
Symmetric encryption uses a single key. Asymmetric encryption uses public
and private keys.
You encrypt with the public key and decrypt with the private key.
Best,
JLA
Sent with Good (www.good.com)
-------- Original Message --------
From : listbounce (at) securityfocus (dot) com [email concealed]
To : saghar es...
[ more ]
Privacy Statement
Copyright 2010, SecurityFocus
Symmetric encryption uses a single key. Asymmetric encryption uses public
and private keys.
You encrypt with the public key and decrypt with the private key.
Best,
JLA
Sent with Good (www.good.com)
-------- Original Message --------
From : listbounce (at) securityfocus (dot) com [email concealed]
To : saghar es...
[ more ]