Description: 1, the use of public key cryptographic techniques to achieve symmetric cryptography key distribution 2, using the symmetric key by the distribution of the content of communication encryption/decryption
File list (Check if you may need any files):