Data Encryption using a Public Key Crypto-System

When Thomas wants to send a secret message to Peter, Thomas gets Peter's public key to encrypt the message.  When Peter received his encrypted message via the Internet, Peter's private key is used to decrypt it.  The following figure is an overview of the process.

Chinese Version
  


Copyright © 1999 Department of Computer Science and Information Systems, The University of Hong Kong. All rights reserved.