Appendix G. Overview of public key cryptography

Overview

This appendix provides an overview of public key cryptographic techniques, and how they are applied in the SSL (secure sockets layer) communications protocol. It discusses encryption and decryption, secure hash algorithms, digital signatures, and certificates.

Get Applied Enterprise JavaBeans™ Technology now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.