3Web Security

image

You may not have realized it before, but the Internet as we know it couldn’t exist without a solution to the shared key problem. Think about a typical situation: you’re buying something at an online retailer that you’ve never purchased from before. At some point you will be asked for your credit card data. Your browser tells you that your data is secure, perhaps by displaying a “lock” icon in the corner. But for the browser to protect your card number using AES, both your system and the retailer must use the same encryption key. How do two systems securely transmit data without getting together beforehand to exchange a key?

Solving ...

Get How Software Works now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.