Through part I we’ve seen what exactly we are trying to achieve through security; we’ve also seen what types of encryption there is and looked at three examples. In part II we learnt that signing is the same as encrypting a message-digest with a private key. However if we need to actually encrypt a message, we would use public-key encryption.  One thing… Continue reading