First page Back Continue Last page Overview Graphics
Two keys – continued
The part of key distribution problem is solved. You can post the public key anywhere. People can encrypt messages to you, which can only be decrypted with the private key
The system is based on the assumption that it easy to convert the private key in into the public but computationally infeasible to do the reverse.
“No polynomial-time method for factoring large integers on a classical computer has yet been found, but it has not been proven that none exists.”*