First page Back Continue Last page Overview Graphics
Two keys – continued
- The part of key distribution problem is solved. You can post the public key anywhere. People can encrypt messages to you, which can only be decrypted with the private key
- The system is based on the assumption that it easy to convert the private key in into the public but computationally infeasible to do the reverse. 
- “No polynomial-time method for factoring large integers on a classical computer has yet been found, but it has not been proven that none exists.”*