 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
• |
It
is much more costly than typical secret-
|
|
|
key
methods
|
|
|
|
– |
Use
RSA to hide (i.e., encrypt) a secret key,
|
|
|
|
– |
Encrypt
the message with the secret key and
|
|
|
|
append/prefix
the encrypted key
|
|
|
• |
Requires
a “Public Key Infrastructure” for
|
|
|
effective
key generation and distribution
|
|
|
|
– |
Chain of trust thing again!
|
|