Public Key Cryptography
In the previous article, I discussed an overview of symmetric key cryptographic systems. The major drawback of such a system that held symmetric key cryptography to be used widely in business circles was the exchange of keys over an insecure channel....
saditya9211.hashnode.dev7 min read