Source: https://nakamotoinstitute.org/static/docs/secrecy-authentication-and-public-key-systems.pdf