Combining Public, Symmetric Key
Symmetric Key Encryption and Public Key Encryption are Complementary, not Competitors
Often, partners first communicate with public key encryption
Including initial authentication
Public Key Authentication
A
B
Previous slide
Next slide
Back to first slide
View graphic version