How Asymmetric Cryptography Works?
Always consult an expert when designing a system that relies on encryption Easy to use a perfectly good cipher in a way that either weakens the crypto, or provides no real securityExample: 802.11 wireless networking took a cipher that is secure when used correctly……and created a system which gives away both your data and your private key to eavesdroppers Then they burned it into ROM on millions of devicesNever rely on keeping your algorithm secret Security must depend only on secrecy of keysNever design your own ciphers Unless you have a Ph.D.