IBM Novell 10 SP1 EAL4 Design Manual page 196

Suse linux enterprise server high-level design
Table of Contents

Advertisement

Figure 5-88: Asymmetric keys
If encryption is done with a public key, only the corresponding private key can be used for decryption. This
allows a user to communicate confidentially with another user by encrypting messages with the intended
receiver's public key. Even if messages are intercepted by a third party, the third party cannot decrypt them.
Only the intended receiver can decrypt messages with his or her private key. The following diagram
conceptually illustrates encryption with a public key to provide confidentiality.
Figure 5-89: Encryption with private key provides authentication
184

Advertisement

Table of Contents
loading

Table of Contents