next up previous
Next: 3.3.5 How is information Up: 3.3 Data Security: Cryptography Previous: 3.3.3 What is public

3.3.4 How does someone obtain a pair of keys?

A specialized piece of computer hardware and/or software generates key pairs on demand according to the method defined by the PKC standards.

Denis Arnaud