![]() | This redirect does not require a rating on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||
|
None listed. |
This should probably be combined with Public-key cryptography or vice-versa. Rasmus Faber 15:40, 8 Dec 2003 (UTC)
Not all asymmetric key algorithms operate in precisely this fashion. The most common have the property that Alice and Bob own two keys; neither of which is (so far as is known) deducible from the other.
Pure nonsense, in most cases it is simple to generate the public key from the private, but the reverse is intended to be VERY hard. Tacvek 23:13, 18 Apr 2005 (UTC)