On Fri, Jan 18, 2013 at 12:54 AM, R.S. <[email protected]> wrote:
<deleted>
> c) you can use assymetric cryptography to exchange the keys. The safest way,
> probably he most complicated.
<deleted>
Public key?  Where anybody can encode with the public key, but only
the private key, kept by the sender, can decode?
-- 
Mike A Schwab, Springfield IL USA
Where do Forest Rangers go to get away from it all?

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to