Introduction - If you have any usage issues, please Google them yourself
Completed based on public key certificate allocation asymmetric key
Description:
( A ) as a communication between the parties A and B, there is a common trusted third-party CA, generated by the CA public key certificate for each person and the corresponding private key and distributed to A, B.
(2) A and B respectively own public key certificate to each other , respectively, the other public key certificate in the local authentication is reliable ( assuming A, B have the CA s public key ) , and A with B s public key to encrypt a data X ( integer, can define their own, such as 100 ) and sent to B, B to use their private key to decrypt the data obtained by X, and then press the negotiated function F ( eg F (X) = 2* X) is calculated F (X), and then encrypted using the public key of A to a A locally decrypted with the private key to obtain F (x), obtained in the same local computing F (X) for comparison , if the same , indicating that public key distribution success.
(3) A with B s pu