- Words: 2728
- Length: 8 Pages
- Topic: Education - Computers
- Paper #: 36332437
The public-key cryptography approach also creates a more efficient means of cryptographic security by ensuring RSA-compliant encryption and decryption throughout the secured network (Sarkar, Maitra, 2010). As a result the use of public-key cryptography hardens and makes more secure each connection and node on a network (Chevalier, Rusinowitch, 2010).
C3. What will help you trust a public-key that belongs to an unfamiliar person or Web site, and why does it