OCR: security of the subsequent commun ications will not be diminished. As a matter of fact the only weakness in the system is that we must insure that we get legitimate copies of someone 's public component. Another advantage, one which secret key systems op not share is that in a group ofN users, total of N keys is needed to allow any pair tc communicate securely whereas in a secret key system, each unique pair must have unique key requring N(N-1)/2 keys. Finally public key cryptosystems also allowlfgital signatures, way for Bob to send message Alice such that Alice has no doubt that Bob sent the message anduthermox, such thatAlice can convince neutral judge that Bob sent the message The emerging Internet Privacy Enhanced Mail (PEM) standard as described in RFCs 1421-1424 prov ides 10J secure ...