3Web Security

image

You may not have realized it before, but the Internet as we know it couldn’t exist without a solution to the shared key problem. Think about a typical situation: you’re buying something at an online retailer that you’ve never purchased from before. At some point you will be asked for your credit card data. Your browser tells you that your data is secure, perhaps by displaying a “lock” icon in the corner. But for the browser to protect your card number using AES, both your system and the retailer must use the same encryption key. How do two systems securely transmit data without getting together beforehand to exchange a key?

Solving ...

Get How Software Works now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.