Last Lectures of the Week
Before we want use a crypto system, we require an irrefutable proof that the decryption function correctly returns the original plain text.
Related reading: Stein et al. p. 129–131
In practice public key ciphers are used in conjunction with symmetric (secret key) ciphers. Let’s see how.
Related reading: Rosen p. 299–300