作者: Sarvar Patel
DOI:
关键词: Public-key cryptography 、 Information sensitivity 、 Encryption 、 Computer security 、 Business 、 Wireless
摘要: In the method for transferring sensitive information using unsecured communication, a first party receives public key of second party, produces an encryption result by performing keyed on at least random number key, and transfers to over communication channel. The decrypts obtain number. Authorizing is then transferred from encrypted authenticated channel established Sensitive further if accepts authorizing information. Numerous applications exist system method, including wireless industry wherein mobile network.