Cyber Law and Ethics
Cyber Law and Ethics
Cyber Law and Ethics
Receiver “B”
Sender “A”
Encrypted Message Decrypts the message using his
Encrypts the message using public
private key
key