Академический Документы
Профессиональный Документы
Культура Документы
With public key encryption, the sender converts the plaintext message into cipher text by
encrypting it with the public key in the message recipient's X.509 certificate. The message
recipient converts the cipher text back into the plaintext message by decrypting it with the
corresponding private key.
Figure 1 illustrates how public key encryption and decryption take place.
that allows a transaction to be traced through all stages of its information processing. The
audit trail of manual information systems was quite visible and easy to trace, however,
computer-based information systems have changed the form of the audit trail.