21. Without knowing this private key, no outsider can unscramble the incoming messages. 22. Information encrypted with a particular public key can only be decrypted with its corresponding private key. 23. The certification will carry information on the identity of a person, including a series of numbers called public key and private key. |