Skip to Content
Microsoft® Windows® 2000 Security Handbook
book

Microsoft® Windows® 2000 Security Handbook

by Jeff Schmidt
August 2000
Intermediate to advanced
800 pages
21h 5m
English
Que
Content preview from Microsoft® Windows® 2000 Security Handbook

Applications that Use Encryption

I have discussed a number of the common encryption algorithms you might encounter as you work in the security field. It is equally important to understand the applications that utilize these algorithms.

Messaging

One of the first and most important uses for encryption has to be messaging. As I discussed in the "History of Cryptography" section of the chapter, one of the first recorded uses of cryptographic techniques was when Caesar used the Caesar Cipher to encrypt messages during battles. The techniques have gotten much more sophisticated, but the intent remains the same. People need to be able to send and receive messages securely, particularly when the message will be traveling across the Internet.

In the ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Windows Server® 2008 Security Resource Kit

Windows Server® 2008 Security Resource Kit

Jesper M. Johansson
Windows Server® 2008 Active Directory® Resource Kit

Windows Server® 2008 Active Directory® Resource Kit

Conan Kezema Stan Riemer Mike Mulcare, Byron Wright, and Microsoft Active Directory

Publisher Resources

ISBN: 0789719991Purchase book