It?s similar to public key cryptography
but at least one valid certificate is required to establish encrypted session
Hybrid cryptography isn?t using keys, it?s based on certificates
It?s similar to private key cryptography
but keys are available to authorized people (who know appropriate public key)
Hybrid cryptography can use both private and public keys at any stage of the session
Exchange of keys are done using public key cryptography
but following encrypted exchanged ? via private key cryptography
Exchange of keys are done using private key cryptography
but following encrypted exchanged ? via public key cryptography
|