N/APosted on - 09/30/2011
When I was searching about the Public Key Encryption I found this diagram that explains about the Public Key Encryption process.
But I cannot understand what it will describe. So someone please describe me what is explaining from this diagram.
Public Key Encryption example description
I will describe the screenshot the way I exactly interpret the picture. The picture will speak for itself. You will notice that their is a constant cycle from Point A to Point B and going back in cycle again.
In this diagram, sender A is sending data with encryption. Recipient B recognizes and detects the data sends by Sender A. Recipient B needs to get pass the authentication page by logging in the correct data encryption assigned by Sender A.
Once the data entered is correct and authentication phase is successful then Recipient B gets pass and being allowed to get into the mix then we have a cycle in process. Sender A to Recipient B and goes back to Sender A. Sender A let Sender B come in and we have a complete recycle.