Having full power over your files at any time is important to relieve your everyday tasks and boost your productivity. Accomplish any objective with DocHub tools for document management and hassle-free PDF file editing. Access, change and save and integrate your workflows along with other secure cloud storage.
DocHub gives you lossless editing, the possibility to use any format, and securely eSign documents without the need of looking for a third-party eSignature option. Obtain the most from the document managing solutions in one place. Check out all DocHub functions today with the free account.
[Music] in the last lesson we talked about symmetric encryption and asymmetric encryption we mentioned that asymmetric encryption uses two different keys to do its encryption and decryption well those two keys are referred to as a key pair and you can use that key pair to do encryption so let me show you how that works were going to use pam and jim theyre going to use asymmetric keys to securely exchange data with one another now since these two are two different people they each have their own set of public and private keys pam has one set of public and private keys she has her public key closer to jim available to jim if he needs it and she has her private key hidden private from anybody else jim also has his own set of public and private keys and like we discussed in the last lesson what is encrypted with this public key can only be decrypted with this private key and vice versa so let me show you how these keys are used to do encryption lets say jim has a message that he wants