Getting full control over your files at any time is crucial to ease your day-to-day duties and enhance your efficiency. Achieve any goal with DocHub tools for papers management and convenient PDF file editing. Gain access, change and save and incorporate your workflows with other secure cloud storage.
DocHub gives you lossless editing, the chance to use any format, and safely eSign papers without searching for a third-party eSignature software. Maximum benefit from the file managing solutions in one place. Consider all DocHub capabilities today with the free account.
[Music] in the last lesson we talked about symmetric encryption and asymmetric encryption we mentioned that asymmetric encryption uses two different keys to do its encryption and decryption well those two keys are referred to as a key pair and you can use that key pair to do encryption so let me show you how that works were going to use pam and jim theyre going to use asymmetric keys to securely exchange data with one another now since these two are two different people they each have their own set of public and private keys pam has one set of public and private keys she has her public key closer to jim available to jim if he needs it and she has her private key hidden private from anybody else jim also has his own set of public and private keys and like we discussed in the last lesson what is encrypted with this public key can only be decrypted with this private key and vice versa so let me show you how these keys are used to do encryption lets say jim has a message that he wants