ABSTRACT

Traditional cryptosystems are based on the secret key, or symmetric, model (see Figure 1 ). In this system, each user has his or her own secret key, which is used for both encryption-in which plaintext is converted to ciphertext-and decryption-in which the process is reversed.