Chapter 11. Protecting Your Data
This chapter is about protecting your data from being viewed by malicious users using encryption, and from being manipulated or corrupted using hashing and signing.
This chapter covers the following topics:
- Understanding the vocabulary of protection
- Encrypting and decrypting data
- Hashing data
- Signing data
Understanding the vocabulary of protection
There are many techniques to protect your data; some of them are as follows:
- Encryption and decryption: This is a two-way process to convert your data from clear-text into crypto-text and back again.
- Hashes: This is a one-way process to generate a hash value to securely store passwords or that can be used to detect malicious changes or corruption of your data.
- Signatures: This ...