| 1. | Using such an algorithm, only one key pair is needed per user.
|
| 2. | Using RSA, the key pairs are produced using two large prime numbers.
|
| 3. | The certificate authenticates the owner of the private half of the key pair.
|
| 4. | Skype also generates a 1024-bit private / public RSA key pair.
|
| 5. | The key pair generation is a onetime process and is completely user driven.
|
| 6. | In that case, there is a server key pair and a client key pair.
|
| 7. | In that case, there is a server key pair and a client key pair.
|
| 8. | The server's key pair uses two large prime numbers.
|
| 9. | The key pair is protected with the key PIN which controls signing, encryption / decryption processes.
|
| 10. | The RSA or ECC key pair is generated in the application and stored in the mobile.
|