Skip to Content
Microsoft® Windows® 2000 Security Handbook
book

Microsoft® Windows® 2000 Security Handbook

by Jeff Schmidt
August 2000
Intermediate to advanced
800 pages
21h 5m
English
Que
Content preview from Microsoft® Windows® 2000 Security Handbook

Types of Encryption

I have spent most of the chapter so far discussing a lot of the history and mechanics of cryptography. Now, it's time to discuss some of the specifics. Begin by looking at the two main types of encryption available today.

Private Key Cryptography

In private key (also called symmetric key) cryptography, a single key is used for both encryption and decryption. This process is illustrated in Figure 8.1.

Figure 8.1. An example of private key encryption

The encryption example at the beginning of the chapter was an example of a private key algorithm because to encrypt or decrypt the message, you needed the same key. Private key ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Windows Server® 2008 Security Resource Kit

Windows Server® 2008 Security Resource Kit

Jesper M. Johansson
Windows Server® 2008 Active Directory® Resource Kit

Windows Server® 2008 Active Directory® Resource Kit

Conan Kezema Stan Riemer Mike Mulcare, Byron Wright, and Microsoft Active Directory

Publisher Resources

ISBN: 0789719991Purchase book